网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with apermission error message. What action will resolve the problem?()

  • A、Add root user to the /etc/hosts.equiv on serverB
  • B、Create $HOME/.rhosts file for the root user on serverB
  • C、Restart the rshd daemon with root enabled option on serverB
  • D、Add entry to allow root user from serverA to the /etc/hosts.allow on serverB

参考答案

更多 “ A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with apermission error message. What action will resolve the problem?()A、Add root user to the /etc/hosts.equiv on serverBB、Create $HOME/.rhosts file for the root user on serverBC、Restart the rshd daemon with root enabled option on serverBD、Add entry to allow root user from serverA to the /etc/hosts.allow on serverB” 相关考题
考题 Your network consists of an Active Directory forest that contains two domains named contoso.com andRegion1.contoso.com. All servers in the network run Windows Server 2003 Service Pack 2 (SP2).You attempt to create a universal security group and obtain the result shown in the exhibit. (Click the Exhibit button.)You need to ensure that you can create universal security groups in the contoso.com domain.What should you do in the contoso.com domain? ()A. Modify the Default Domain Policy.B. Modify the Default Domain Controllers Policy.C. Raise the domain functional level of the contoso.com domain.D. Add your user account to the Enterprise Administrators group.

考题 When a non-root user connects to a JUNOS platform and enters a username and password, the user is immediately placed at which level?() A.UNIX shellB.user level CLIC.configuration modeD.operational mode

考题 A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with apermission error message.What action will resolve the problem?() A.Add root user to the /etc/hosts.equiv on serverBB.Create $HOME/.rhosts file for the root user on serverBC.Restart the rshd daemon with root enabled option on serverBD.Add entry to allow root user from serverA to the /etc/hosts.allow on serverB

考题 A user is unable to determine the default system text editor. How can the local administrator assist the user by identifying the default text editor for the system?()A、Login as the user and run ’echo $ENV’.B、Login as root and run the ’env’ command.C、Login as root and ’cat /etc/environment’.D、Login as the user and run the ’env’ command.

考题 You are designing a strategy to migrate user accounts. Which two actions should you perform? ()A、Change the functional level.B、Create an external trust relationship.C、Run adprep to prepare the research.com forest.D、Run adprep to prepare the research.com domain.

考题 A user reports that the Windows update function will not run on the computer but the Internet can be accessed. The user is running an original version of Windows XP Professional. Which of the following is MOST likely the cause?()A、The user has not registered the copy of Windows.B、The user has not applied at least Service Pack 1 to their system.C、The user does not know what site to access for the updates.D、The user needs to flush the DNS cache.

考题 A user named User1 uses a shared computer that runs Windows 7. User1 is a standard user. User1 attempts to connect a USB device to the computer and is prompted to enter administrative credentials. Youneed to ensure that User1 can use the USB device without requiring administrative credentials. What shouldyou do first ?()A、Add User1 to the Power Users group.B、Run Pnputil.exe and specify the i a parameters.C、Run Driverquery.exe and specify the /SI parameter.D、Copy the driver files to the C:///windows/system32 folder.

考题 A user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA.  No other users are experiencing the same issue.Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem?()A、User ’joe’ is specified in the /etc/nologin on SYSTEMAB、User ’joe’ is specified in the /etc/nologin on SYSTEMBC、The file permissions on the /home/joe/.rhosts file on SYSTEMA is correct.D、The file permissions on the /home/joe/.rhosts file on SYSTEMB is incorrect.

考题 A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh  commands by the root user return with a permission error message. What action will resolve the problem?()A、Add root user to the /etc/hosts.equiv on serverB .B、Create $HOME/.rhosts file for the root user on serverB .C、Restart the rshd daemon with root enabled option on serverB .D、Add entry to allow root user from serverA to the /etc/hosts.allow on serverB .

考题 An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB

考题 A banking user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA. No other users are experiencing the same issue.  Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem()A、User ’joe’ is specified in the /etc/nologin on SYSTEMb.B、User ’joe’ is specified in the /etc/nologin on SYSTEMa.C、The file permissions on the /home/joe/.rhosts file on SYSTEMA are incorrect.D、The file permissions on the /home/joe/.rhosts file on SYSTEMB are incorrect.

考题 When a non-root user connects to a JUNOS platform and enters a username and password, the user is immediately placed at which level?()A、UNIX shellB、user level CLIC、configuration modeD、operational mode

考题 You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runsTerminal services to enable remote users to run commonly required applications from their terminal. A remote user logged on to the Terminal Server, required some help on the application he wanted to run.However,when you connect to the Terminal Server session,you cannot operate any applications. Which of the following options would you choose to ensure that you can assist any user on the Terminal Server?()A、From the Terminal Server, run the Chguserver /execute command and then reconnect to the session.B、In the RDP-Tcp Properties on the Terminal Server, enable the Use remote control option with default user settings.C、In the RDP-Tcp Properties on the Terminal Server, enable the Use remote control with the following settings option and then configure the Level of control policy setting to Interact with the session. Ask the user to log off and log back on.D、From the Terminal Server, run the Tscon /v command and then reconnect to the session.

考题 Your network contains two Active Directory forests. One forest contains two domains named  contoso.com and na.contoso.com. The other forest contains a domain named nwtraders.com. A forest  trust is configured between the two forests.  You have a user named User1 in the na.contoso.com domain.  User1 reports that he fails to log on to a computer in the nwtraders.com domain by using the user name  NA/User1.  Other users from na.contoso.com report that they can log on to the computers in the nwtraders.com  domain.  You need to ensure that User1 can log on to the computer in the nwtraders.com domain.  What should you do()A、Enable selective authentication over the forest trust.B、Create an external one-way trust from na.contoso.com to nwtraders.com.C、Instruct User1 to log on to the computer by using his user principal name (UPN).D、Instruct User1 to log on to the computer by using the user name nwtraders/User1.

考题 Your network consists of an Active Directory forest that contains one domain named  contoso.com.     All domain controllers run Windows Server 2008 R2 and are configured as DNS servers. You  have two Active Directory-integrated zones: contoso.com and nwtraders.com.   You need to ensure a user is able to modify records in the contoso.com zone. You must prevent  the user from modifying the SOA record in the nwtraders.com zone.     What should you do()A、From the DNS Manager console, modify the permissions of the contoso.com zone.B、From the DNS Manager console, modify the permissions of the nwtraders.com zone.C、From the Active Directory Users and Computers console, run the Delegation of Control Wizard.D、From the Active Directory Users and Computers console, modify the permissions of the Domain Controllers organiz

考题 You are preparing the supporting network infrastructure for the upgrade to Exchange Server 2003. You want to accomplish this upgrade by using the minimum amount of administrative effort.Which two actions should you perform?()A、Run the setup.exe /domainprep command on a domain controller in the prod.testking.com domainB、Run the setup.exe /domainprep command on a domain controller in the app.testking.com domainC、Run the setup-exe /domainprep command on a domain controller in the testking.com domainD、Log on to the domain by using a user account that is a member of the Domain Admins groupE、Log on to the domain by using a user account that is a member of the Schema Admins group

考题 You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named King will leave TestKing in one week. A replacement will be hired in one month. The replacement will need the same access to network resources that King currently has. The replacement will also need ownership of all files that currently reside in King's home folder. You need to minimize the administrative effort that will be required when the replacement is hired. You also need to ensure that no one can use King's user account to log on to the domain until the replacement is hired. What should you do?()A、Move King's user account to the LostAndFound organizational unit (OU).B、Disable King's user account.C、Configure King's user account to require a change in password at next logon.D、Delete King's user account.

考题 Your network consists of a single Active Directory forest. The forest functional level is Windows Server 2008 R2. The forest contains two domains named contoso.com and na.contoso.com.   Contoso.com contains a user named User1. Na.contoso.com contains an organizational unit (OU) named  Security.   You need to give User1 administrative rights so that he can manage Group Policies for the Security OU.   You want to achieve this goal while meeting the following requirements:   èUser1 must be able to create and configure Group Policies in na.contoso.com. èUser1 must be able to link Group Policies to the Security OU.   èUser1 must be granted the least administrative rights necessary to achieve the goal. What should you do?()A、Add User1 to the Administrators group for na.contoso.com.B、Add User1 to the Group Policy Creator Owners group in contoso.com. Modify the permissions on the scurity OU.C、Run the Delegation of Control Wizard on the Security OU. In the Group Policy Management Console,modify the permissions of the Group Policy Objects container in the na.contoso.com domain.D、Run the Delegation of Control Wizard on na.contoso.com. In the Group Policy Management Console, modify the permissions of the Group Policy Objects container in the contoso.com domain.

考题 You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Sever 2012 installed.The domain has a single domain controller named ABC_DC01.You have a Microsoft Excel spreadsheet that contains a list of new ABC.com employees for whom user accounts must be created. Which of the following will allow you to create the new user accounts using the least Administrative effort?()A、You should u Active Directory Users and Computers on ABC_DC01.B、You should run the adsiedit command from the command prompt on ABC_DC01.C、You should run the csvde command from the command prompt on ABC_DC01D、You should run the ldifde command from the command prompt on ABC_DC01.E、You should run the Import-Csv cmdlet in Wondows PowerShell on ABC_DC01.

考题 The user cannot access some Internet websites, but can connect to resources inside the local network. The technician successfully uses the ping command to test the user’s connectivity. Which of the following commands can the technician run NEXT to troubleshoot the issue?()A、net /?B、ipconfig /flushdnsC、netstat -rD、nbtstat -R

考题 单选题A user in your company network needs to encrypt a folder that is on her Windows 2000 Professional computer. Her computer has two drives: Drive C and Drive D. The folder that needs to be encrypted is located on Drive D. When the user attempts to encrypt the folder, no option for encryption can be found in the folder properties. What should you do to enable the user to encrypt the folder? ()A Log on to her computer as an administrator, and then run the cipher/e command.B Instruct the user to run the chipper/e command.C Log on to her computer as an administrator, and then run the Secedit/enforce command.D Instruct the user to run the Secedit/enforce command.E Log on to her computer as an administrator, and then run the Convert d:/FS:NTFS command.

考题 单选题When a non-root user connects to a JUNOS platform and enters a username and password, the user is immediately placed at which level?()A UNIX shellB user level CLIC configuration modeD operational mode

考题 单选题An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A As the root user from serverA run the command rhost serverBB As the root user from serverA run the command rlogin serverBC As the desired user from serverB run the command rhost serverAD As the desired user from serverA run the command rlogin serverB

考题 单选题You have an Exchange Server 2010 organization named contoso.com. Your company is investigating a user named User1. You need to prevent User1 from permanently deleting the items in his mailbox.  What should you run()?A Set-Mailbox User1 -LitigationHoldEnabled $trueB Set-Mailbox User1 -ModerationEnabled $trueC Set-Mailbox User1 -RetainDeletedItemsUntilBackup $trueD Set-Mailbox User1 -RetentionHoldEnabled $true

考题 单选题A user is unable to determine the default system texteditor. How can the local administrator assist the user by identifying the default text editor for the system?()A Login as the user and run 'echo $ENV'.B Login as root and run the 'env' command.C Login as root and 'cat /etc/environment'.D Login as the user and run the 'env' command.