网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user is unable to determine the default system texteditor. How can the local administrator assist the user by identifying the default text editor for the system?()
A

Login as the user and run 'echo $ENV'.

B

Login as root and run the 'env' command.

C

Login as root and 'cat /etc/environment'.

D

Login as the user and run the 'env' command.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user is unable to determine the default system texteditor. How can the local administrator assist the user by identifying the default text editor for the system?()A Login as the user and run 'echo $ENV'.B Login as root and run the 'env' command.C Login as root and 'cat /etc/environment'.D Login as the user and run the 'env' command.” 相关考题
考题 A router has been configured with the settings shown below:[edit]user@host show system authentication-order authentication-order [ radius tacplus ];The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()A.The user lab will not be able to login.B.The user lab will be authenticated against the local database and will be able to login.C.The user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.D.The user will be able to login only if tries to login as the root user.

考题 An administrator created a .env file in a user‘s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set.What is the most likely reason that the custom .env file is being ignored?()A.A shell other than ksh is being used by the user.B.The line ‘export ENV=$HOME/.env‘ is missing from /etc/profile.C.The line ‘export ENV=$HOME/.env‘ is missing from the user‘s .profile.D.The env_profile attribute is not defined for the user within /etc/security/user.

考题 A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()A、Request the user to logoff and log back on.B、Add the user as an administrator on their local machine.C、Add the user as an administrator on the server.D、Run an ipconfig /renew on the user’s machine.

考题 A user is unable to determine the default system texteditor. How can the local administrator assist the user by identifying the default text editor for the system?()A、Login as the user and run 'echo $ENV'.B、Login as root and run the 'env' command.C、Login as root and 'cat /etc/environment'.D、Login as the user and run the 'env' command.

考题 A user’s print jobs default to PRINTER_A.The user wants to change their default printer to PRINTER_B.How can the system administrator change the user’s default printer to PRINTER_B?()A、Execute the command ’piobe -q PRINTER_B’B、Edit the user’s stanza in the /etc/qconfig fileC、Execute the command ’chuser -a QUEUE=PRINTER_B user’D、Add the line ’export PRINTER=PRINTER_B’ to the user’s .profile

考题 A user is unable to determine the default system text editor. How can the local administrator assist the user by identifying the default text editor for the system?()A、Login as the user and run ’echo $ENV’.B、Login as root and run the ’env’ command.C、Login as root and ’cat /etc/environment’.D、Login as the user and run the ’env’ command.

考题 A user in your company network needs to encrypt a folder that is on her Windows 2000 Professional computer. Her computer has two drives: Drive C and Drive D. The folder that needs to be encrypted is located on Drive D. When the user attempts to encrypt the folder, no option for encryption can be found in the folder properties. What should you do to enable the user to encrypt the folder? ()A、Log on to her computer as an administrator, and then run the cipher/e command.B、Instruct the user to run the chipper/e command.C、Log on to her computer as an administrator, and then run the Secedit/enforce command.D、Instruct the user to run the Secedit/enforce command.E、Log on to her computer as an administrator, and then run the Convert d:/FS:NTFS command.

考题 A router has been configured with the authentication order settings shown below: [edit] user@host# show system authentication-order authentication-order [radius tacplus password]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers respond with a reject for user lab?()A、The user lab will not be able to login.B、The user lab will be authenticated against the local database and will be able to login.C、The user will be able to login only if tries to login as the root user.D、The user lab will receive an error message indicating the username and password provided could not be found on the radius and tacacs servers.

考题 Bob, a technician, needs to backup a user’s local My Documents on a Windows XP workstation.Which of the following is the QUICKEST way to the user’s folder?()A、Browse to the root, Documents and Settings, user’s name, and then My DocumentsB、Browse to the root, Users, Documents and Settings, user’s name, and then My DocumentsC、Type %system% into the run boxD、Type %temp% into the run box, My Documents, and then user’s name

考题 A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A、Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B、Increase the number of licenses; using smit chaili censeC、Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D、Change User can logi field from false to true: using smit chuser.

考题 Which of the following is a correct statement about how the user environment is configured at login?()A、If present, the settings in the $HOME/.profile file will override the settings in the /etc/profile file.B、If both $HOME/.profile and $HOME/.env files are present, the settings in the $HOME/.profile file will take precedence.C、The settings in the /etc/environment file are system-wide and will override user customized settings in the $HOME/.profile.D、The settings in the /etc/profile file will override settings in the $HOME/.profile file unless the $LOCAL_PROFILE variable is set to 'true'.

考题 When a user tries to log into the system, the following error occurs:  "3004-004. You must "exec" login from the lowest login Shell". Which of the following procedures should be performed next to determine the cause of the problem?()A、 Reboot the system. B、 Increase the number of ptys. C、 Increase number of licenses. D、 Run df -k to check for full filesystems.

考题 An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()A、A shell other than ksh is being used by the user.B、The line ’export ENV=$HOME/.env’ is missing from /etc/profile.C、The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.D、The env_profile attribute is not defined for the user within /etc/security/user.

考题 An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB

考题 A system administrator would like to modify the system default user characteristics so that each new user will now be assigned (by default) the csh shell rather than the ksh shell. Which of the following actions should be performed?()A、Run the command chlogin -shell "csh"B、Run the command mkuser -default "SHELL=csh"C、Edit /etc/passwd and change all "ksh" entries to "csh"D、Modify the contents of /usr/lib/security/mkuser.default file

考题 How can you verify that you have correctly configured SSH access to your Junos device?()A、user@router# show system servicesB、user@router show configuration servicesC、user@router# show configuration system servicesD、user@router# show system login

考题 Which two statements about login classes correctly define their usage within the JUNOS software?()A、A different login class must be configured for each user.B、Individual commands can be explicitly allowed or denied.C、A user must be assigned to one of the default login classes.D、Each login class is associated with one or more permissions flags.

考题 单选题A user’s print jobs default to PRINTER_A.The user wants to change their default printer to PRINTER_B.How can the system administrator change the user’s default printer to PRINTER_B?()A Execute the command ’piobe -q PRINTER_B’B Edit the user’s stanza in the /etc/qconfig fileC Execute the command ’chuser -a QUEUE=PRINTER_B user’D Add the line ’export PRINTER=PRINTER_B’ to the user’s .profile

考题 单选题Bob, a technician, needs to backup a user’s local My Documents on a Windows XP workstation.Which of the following is the QUICKEST way to the user’s folder?()A Browse to the root, Documents and Settings, user’s name, and then My DocumentsB Browse to the root, Users, Documents and Settings, user’s name, and then My DocumentsC Type %system% into the run boxD Type %temp% into the run box, My Documents, and then user’s name

考题 单选题An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()A A shell other than ksh is being used by the user.B The line ’export ENV=$HOME/.env’ is missing from /etc/profile.C The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.D The env_profile attribute is not defined for the user within /etc/security/user.

考题 单选题An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()A A shell other than ksh is being used by the user.B The line ’export ENV=$HOME/.env’ is missing from /etc/profile.C The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.D The env_profile attribute is not defined for the user within /etc/security/user.

考题 单选题An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A As the root user from serverA run the command rhost serverBB As the root user from serverA run the command rlogin serverBC As the desired user from serverB run the command rhost serverAD As the desired user from serverA run the command rlogin serverB

考题 单选题A router has been configured with the authentication order settings shown below: [edit] user@host# show system authentication-order authentication-order [radius tacplus password]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers respond with a reject for user lab?()A The user lab will not be able to login.B The user lab will be authenticated against the local database and will be able to login.C The user will be able to login only if tries to login as the root user.D The user lab will receive an error message indicating the username and password provided could not be found on the radius and tacacs servers.

考题 单选题A router has been configured with the settings shown below: [edit] user@host# show system authentication-order authentication-order [ radius tacplus ]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()A The user lab will not be able to login.B The user lab will be authenticated against the local database and will be able to login.C The user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.D The user will be able to login only if tries to login as the root user.

考题 单选题A user is unable to determine the default system text editor. How can the local administrator assist the user by identifying the default text editor for the system?()A Login as the user and run ’echo $ENV’.B Login as root and run the ’env’ command.C Login as root and ’cat /etc/environment’.D Login as the user and run the ’env’ command.

考题 单选题When a user tries to log into the system, the following error occurs:  "3004-004. You must "exec" login from the lowest login Shell". Which of the following procedures should be performed next to determine the cause of the problem?()A  Reboot the system. B  Increase the number of ptys. C  Increase number of licenses. D  Run df -k to check for full filesystems.

考题 单选题A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B Increase the number of licenses; using smit chaili censeC Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D Change User can logi field from false to true: using smit chuser.