网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
An administrator wants to limit how much data each user is storing. Which of the following will BEST address this issue?()
A

 Quotas

B

 SNMP

C

 Disk management

D

 ACL


参考答案

参考解析
解析: 暂无解析
更多 “单选题An administrator wants to limit how much data each user is storing. Which of the following will BEST address this issue?()A  QuotasB  SNMPC  Disk managementD  ACL” 相关考题
考题 there is no reason that they should limit how much vitamin you take ____ they can limit how much water you drink. A. any more thanB. no more thanC. much more thanD. no less than

考题 ABC Corp. is implementing 11i Oracle Applications. The company has two local administrators in separate locations. They need to ensure that only a relevant set of users is visible to each of these local administrators.Which action will meet the requirement?()A.create a separate role for each local administratorB.specify user administration privileges in Oracle User ManagementC.use Data Security to provide relevant access to each local administratorD.use Function Security to provide relevant access to each local administrator

考题 You install a custom application on a computer that runs Microsoft Windows XP. The application stores each user’s data in the %programfiles%\app1\data folder on the computer. You install the custom application on a computer that runs Windows Vista.On the Windows Vista computer, you back up the %programfiles%\app1\data folder and notice that the backup contains no data.You need to back up the application’s user data on the Windows Vista computer.What should you do?()A.AB.BC.CD.D

考题 There is no reason they should limit how much vitamin you take,____they can limit how much water you drink.A.no less than B.not any more than C.no more than D.much more or less

考题 There is no reason they should limit how much vitamin you take,( )they can limit how much water you drink. A.much more than B.no more than C.no less than D.any more than

考题 How are the commands a user is allowed to enter defined in JUNOS?()A、Permissions are configured individually for each user.B、Users are associated with user classes, and each class defines the permissions for entering commands.C、There are four default classes with different permissions and you can only use these four.D、Permissions are associated with each user ID

考题 An administrator wants to limit how much data each user is storing. Which of the following will BEST address this issue?()A、 QuotasB、 SNMPC、 Disk managementD、 ACL

考题 An administrator has been instructed to add four additional drives to a server configured with RAID5. The server is using 146GB drives for the data. Without changing the configuration, how much additional data space would be available if the administrator purchased 300GB drives and added them to the existing array?()A、438GBB、584GBC、900GBD、1200GB

考题 A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A、 Guest user accountB、 Limited user accountC、 Power user accountD、 Administrator user account

考题 A company wants to run multiple applications on an x445 to serve their user base.  OS and application licensing cost is a factor. Which TWO questions will help the specialist decide on the operating environment and the number of processors per server?()A、What are the applications’ scaling (multi-threading) capabilities?B、How does L3 cache size impact application performance?C、How many servers are running the applications today?D、What is the expected size of the data attached to the server in GB’s?E、Will the applications disable the Hyperthreading on the Xeon processor?

考题 An AIX system administrator wants to be able to monitor disk usage and to be able to control how much disk space can be used.  Which command is run to obtain the desired output?()A、 /usr/bin/filemon B、 /usr/bin/startsrc C、 /usr/sbin/acct/startup D、 /usr/bin/df

考题 An administrator wants to test the performance of an application at different memory sizes.  What is the most effective way to perform the test and collect statistical information for each test?()  A、Run DLPAR to change the LPAR memory for each test.B、Run rmss command to simulate different memory for each test.C、Run chdev command to limit the system memory size for each test.D、Run chattr command to limit the system memory size for each test.

考题 An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A、/tmpB、/var/preserveC、/var/tmp/$USERD、$HOME/.vi

考题 You are a system administrator at Company. The network includes 100 Windows 2000 Professional computers. A user named Peter wants to share a local printing device directly connected to his computer. Peter needs to share this device among three groups:  Engineering, Accounting, and Operations. Peter wants to delegate printer administration to one print administrator from each group. Each print administrator must be able to delete print jobs generated by their own group on the print device. They should not be able to delete print jobs from other groups. You want to configure Peter’s client computer to support these requirements.  What should you do? ()A、 Create a single shared printer to be used by all three groups.Allow each print administrator Manage Documents permission. B、 Create a separate shared printer for each group. For each shared printer, allow the respective      print administrator Manage Documents permission. C、 Create a single shared printer to be used by all three groups. Add the print administrator’s user      account from each group to the Power Users group on Peter’s client computer. D、 Create a separate shared printer for each group. Add the print administrator’s user account  from each group to the Power Users group on Peter’s client computer. 

考题 You need to define an authentication system for the main office database administrators. The setup should require the minimum amount of administrative effort. The authentication environment must fulfill the company’s security requirements.What should you do?()A、Create a SQL Server login with Windows Authentication for each main office database administrator.Add all of these logins to the db_owner role in each database.B、Create a SQL Server login with SQL Server Authentication for each main office database administrator.Add all of these logins to the sysadmin role.C、Create a Windows global group named DBAdmins. Add each main office database administrator’s Windows user account to the Windows DBAdmins group.Create a SQL Server login with Windows Authentication for the group.Add the group to the serveradmin fixed server role.D、Add each main office database administrator’s Windows user account to the Windows SQLManagersgroup.

考题 You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()A、Configure each computer to join a workgroup.      Create a user account and a local profile for each user. B、Configure each computer to join a workgroup.      Create a domain user account that uses roaming user profiles. C、Configure each computer to join the domain.      Create a user account for each user on a domain controller. D、Configure each computer to join the domain.      Create domain user accounts that use roaming user profiles.

考题 A customer has determined they want to install an IBM x445 system in their company.  They will be running a large database on the system.  In order to determine how many CPUs will be needed to attain the optimum cost-effective solution, which TWO of the following questions should be asked?()A、How large is the database?B、What is the expected user workload?C、How is the database software licensed?D、What type of user interface will be used?E、How much data cache will the database be allocated?

考题 单选题ABC Corp. is implementing 11i Oracle Applications. The company has two local administrators in separate locations. They need to ensure that only a relevant set of users is visible to each of these local administrators. Which action will meet the requirement?()A create a separate role for each local administratorB specify user administration privileges in Oracle User ManagementC use Data Security to provide relevant access to each local administratorD use Function Security to provide relevant access to each local administrator

考题 单选题What should an administrator do to allow the logon of a user to a local system without limitations from the host‘webserver’?()A configure the /etc/.rhosts with:webserverB configure the root’$HOME/.rhost file with:+webserverC configure each user’s $HOME/.rhosts file with:webserverD configure the root’$HOME/.rhost file with:webserver

考题 单选题The System Administrator wants to do a backup of the HMC and notices that there are two options on the HMC menu: Backup Critical Console data and Save Upgrade Data. Which of the following best describes the differences between the two options?()A Both options back up user and partition profile data. Only the Backup Critical Console Data backs up TCP/IP settings or preferencesB Both options back up partition profile information. Only the Backup Critical Console Data backs up service function settings, such as Inventory Scout, Service Agent, and Service Focal PointC The Backup Critical Console Data should be performed just before the HMC software update operation. The Save Upgrade Data should be performed each time configuration changes are made to the system or the HMCD The Save Upgrade Data should be performed just before the HMC software update operation. The Backup Critical Console Data should be performed each time configuration changes are made to the system or the HMC

考题 单选题You are the network administrator for ExamSheet inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrator group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary.  Eric wants to prevent Julia from changing the permissions on file that Eric creates. To accomplish his goal, Eric creates a folder named C:/Data. He changes the NTFS permission on C:/Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions.  Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:/Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:/Data.  What should you instruct Eric to do?()A Add Julia’s user account to the local Power Users group.B Add Julia’s user account to the local Administrators group.C Allow Julia’s user account Write permissions to C:///Data.D Allow Julia’s user account Full Control permission to C:///Data.

考题 单选题You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:///Data. He changes the NTFS permission on C:///Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:///Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:///Data. What should you instruct Eric to do? ()A Add Julia’s user account to the local Power Users group.B Add Julia’s user account to the local Administrators group.C Allow Julia’s user account Write permissions to C:///Data.D Allow Julia’s user account Full Control permission to C:///Data.

考题 单选题An administrator is configuring cross-site LVM and wants to ensure that logical volume copies are always onseparate disks. When creating a new logical volume, how could the administrator ensure that this requirement is achieved?()A Set the allocation policy to strictB Set the allocation policy to superstrictC Set the Maximum Number of Physical Volumes to 2D Set the Number of Copies for each logical partition to 2

考题 单选题A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()A Configure roles based on departments and assign access based on source IP address.B Configure roles based on the user's manager and assign access based on the user's MAC addressC Configure roles based on group memberships and assign a specific VLAN to the role.D Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.

考题 单选题An AIX system administrator wants to be able to monitor disk usage and to be able to control how much disk space can be used.  Which command is run to obtain the desired output?()A  /usr/bin/filemon B  /usr/bin/startsrc C  /usr/sbin/acct/startup D  /usr/bin/df

考题 单选题A user’s print jobs default to PRINTER_A.The user wants to change their default printer to PRINTER_B.How can the system administrator change the user’s default printer to PRINTER_B?()A Execute the command ’piobe -q PRINTER_B’B Edit the user’s stanza in the /etc/qconfig fileC Execute the command ’chuser -a QUEUE=PRINTER_B user’D Add the line ’export PRINTER=PRINTER_B’ to the user’s .profile

考题 单选题How are the commands a user is allowed to enter defined in JUNOS?()A Permissions are configured individually for each user.B Users are associated with user classes, and each class defines the permissions for entering commands.C There are four default classes with different permissions and you can only use these four.D Permissions are associated with each user ID