网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
What does the Filesystem Hierarchy Standard enable? ()
A

software to predict the location of installed files and directories

B

software to predict the ownership and access rights to files and directories

C

users to predict the location of installed files and directories

D

users to predict how the filesystem should be formatted according to need


参考答案

参考解析
解析: 暂无解析
更多 “多选题What does the Filesystem Hierarchy Standard enable? ()Asoftware to predict the location of installed files and directoriesBsoftware to predict the ownership and access rights to files and directoriesCusers to predict the location of installed files and directoriesDusers to predict how the filesystem should be formatted according to need” 相关考题
考题 What is the default local location for syslog and trace files?() A./logB./home/logC./var/logD./etc/log

考题 Which two installations must be completed to allow third-party software to interact with the Cisco Unified CallManager Express system through TAPI Lite?()A、the files in the Cisco IOS TSP file on all Windows PCs on the LAN B、both the Cisco IOS TSP and TAPI Lite files on all Windows PCs on the LAN C、the Cisco TAPI Lite files on the same Windows PC where the software is installed D、the files in the Cisco IOS TSP file on the same Windows PC where the software is installed E、the Cisco IOS TSP on the same Windows PC where the software is installed and on all remote teleworker PCs

考题 You decided to change the location of the flash recovery area. You executed the following command: Which statement is true?()A、The location can be changed only if the flash recovery area is empty.B、After executing the command, all new flash recovery area files will be created in the new location.C、The command will generate an error because you cannot change the flash recovery area while the database is open.D、All the existing files in the flash recovery area will be moved to the new location, and all new Flash Recovery Area files will be created in the new location.

考题 Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a member server named Server1. Server1 has the File Server server role installed. On Server1, you create a share named Documents. The Documents share will contain the files and folders of all users. You need to ensure that when the users connect to Documents, they only see the files to which they have access. What should you do?()A、Modify the NTFS permissionsB、Modify the Share permissionsC、Enable access-based enumerationD、Configure Dynamic Access Control

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All user files are stored in home folders on a member server named Testking3. Full backups are performed on Testking3 every day. A user named Mark leaves the company. A technical support specialist deletes Mark's user account and his files. You need to restore certain files from Mark's folder and enable another user named Anne to access them. What should you do?()A、Clear the Restore security check box. Use the Backup utility to restore Mark's files to the original location.B、Select the Restore security check box. Use the Backup utility to restore Mark's files to the original location.C、Clear the Restore security check box. Use the Backup utility to restore Mark's files to Anne's home folder.D、Select the Restore security check box. Use the Backup utility to restore Mark's files to Anne's home folder.

考题 A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.

考题 What is the default local location for syslog and trace files?()A、/logB、/home/logC、/var/logD、/etc/log

考题 What does the Filesystem Hierarchy Standard enable? ()A、 software to predict the location of installed files and directoriesB、 software to predict the ownership and access rights to files and directoriesC、 users to predict the location of installed files and directoriesD、 users to predict how the filesystem should be formatted according to need

考题 After moving files from one folder to another, the technician cannot access them. Which of the following MUST the technician do to regain access to these files?()A、In folder options, select show hidden files and folders.B、Perform the transfer again.C、Reboot the system; access will be reset automatically.D、Take ownership of the files.

考题 Which of the following is the default location for Fonts in Windows 7?()A、C:/System Files/FontsB、C:/Windows/FontsC、C:/Windows/System Files/FontsD、C:/System/Fonts

考题 You decided to change the location of the flash recovery area. You executed the following command:   ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’+disk1’ SCOPE=BOTH SID=’*’;   Which statement is true?()A、 The location can be changed only if the flash recovery area is empty.B、 After executing the command, all new flash recovery area files will be created in the new location.C、 The command will generate an error because you cannot change the flash recovery area while the database is open.D、 All the existing files in the flash recovery area will be moved to the new location and all new Flash Recovery Area files will be created in the new location.

考题 You have an Automatic Storage Management (ASM) instance managing the database files of your production database. The database contains ASM files and non-ASM files. Using Recovery Manager (RMAN), you migrate the complete production database to use the ASM instance. Which statement is true? ()A、 RMAN would relocate all the data files to an ASM disk group and other files to an operating system location, defined using Oracle Managed Files (OMF).B、 RMAN would relocate the ASM files to an ASM disk group and the non-ASM files to an operating system location, defined using OMFC、 RMAN would relocate all the database files to an ASM disk group.D、 RMAN would change the file definitions in the control file to use the ASM but would not relocate the database files physically.

考题 You enabled the flashback logging feature, but you have not specified the location of the flash recovery area. Which location would be used as the default location for the flash recovery area?()A、 The location used for control files.B、 The location used for redo log files.C、 The location set by using $ORACLE_BASED、 The location set by using $ORACLE_HOMEE、 The location set by using CORE_DUMP_DESTF、 The location set by using BACKGROUND_DUMP_DEST

考题 Which three statements are true about the stages of database startup?()A、Data files and redo log files can be renamed at the MOUNT stage.B、Control files are read at the OPEN stage for the location of data files.C、Control files are required to bring the database to the NOMOUNT stage.D、Data files and redo log files are made available to users at the OPEN stage.E、Data files and online redo log files are checked for consistency while opening the database

考题 You configured the Flash Recovery Area (FRA) for your database. The database instance is runningin ARCHIVELOG mode. The default location for the archived redo log files is the Flash Recovery Area.  Which two files are removed automaticallyif the space is required in the FRA as per the retention policy()A、flashback log filesB、backups that have become obsoleteC、copies of the data files and control filesD、archived redo log files that have multiple copies in a different archive location and not backed up

考题 You are the administrator of Company’s network.  Your Windows 2000 Professional computer has a removable disk device installed. The device can use storage modules of varying sizes. You use these storage modules to transfer graphics files between your location and a printing company. The printing company uses Windows 98. You insert a new 1 GB disk device into your computer and format the new disk device as NTFS with the default options. You then place large graphics files on the disk device and deliver it to the printing company. The printing company reports that they are unable to access the files.  You want the printing company to be able to access the graphics files on the new disk device.   What should you do? ()A、Format the new disk device as FAT16 with a 128 KB cluster size.B、Format the new disk device as FAT32 with a 4 KB cluster size.C、Format the new disk device as NTFS with a 4 KB cluster size.D、Format the new disk device as NTFS with a 8 KB cluster size.

考题 Your network consists of a single Active Directory domain. All network servers run Windows Server 2003 Service Pack 2 (SP2). You need to use Windows Backup to restore files to a shared folder located on a file server. The restore must maintain all the file versions saved by users since the last backup. What should you do?()A、Restore the files to their original location and select the Replace existing files option.B、Restore the files to their original location and select the Replace existing files if they are older than the backup files option.C、Restore the files to an alternate location. Copy the files to the shared folder and choose to overwrite the files with duplicate file names.D、Restore the files to an alternate location. Copy the files to the shared folder and choose not to overwrite thefiles with duplicate file names.

考题 You are the administrator of your company’s network. A user named Peter runs Windows 2000 Professional on his portable computer. Peter wants to be able to work at home on files that were created in the office on the company network.  Prior to logging off the network and leaving the office, Peter enables Offline Files. Peter calls you from home and reports that copies of his folders and files on the network are not available on his portable computer.  What should you instruct Peter to do? ()A、 Enable file and print sharing.   Peter will be able to access his files at home immediately. B、 Synchronize all offline files.   Peter will be able to access his files at home immediately. C、 At the office, make the files available offline.   Peter will be able to access his files the next time he logs off the network. D、 At the office, create a shortcut to the Offline Files folder.   Peter will be able to access his files the next time he logs off the network. 

考题 Kevin, the Software Developer of Perfect Solution Inc., recently left his job. The company's Administrator moves all of his home folder files to his Manager's home folder. The NTFS partition that contains the home folders has the Encrypting File System (EFS) enabled. When the Manager attempts to open Kevin's files, he is denied access.   What should be done, so that the Manager can access those files with least administrative burden? ()A、Grant the Manager NTFS Full Control permission to the files.B、Grant the Manager the NTFS Take Ownership permission to the files.C、Logon to the network as a Recovery Agent. Decrypt the files for the Manager.D、Logon to the network as a member of Backup Operators group. Decrypt the files for the Manager.

考题 多选题You configured the Flash Recovery Area (FRA) for your database. The database instance is running inARCHIVELOG mode. The default location for the archived redo log files is the Flash Recovery Area.  Which twofiles are removed automatically if the space is required in the FRA as per the retention policy()AFlashback log filesBBackups that have become obsoleteCUser managed backups of the data files and control filesDArchived redo log files that have multiple copies in a different archive location and not backed up

考题 多选题You configured the Flash Recovery Area (FRA) for your database. The database instance is runningin ARCHIVELOG mode. The default location for the archived redo log files is the Flash Recovery Area.  Which two files are removed automaticallyif the space is required in the FRA as per the retention policy()Aflashback log filesBbackups that have become obsoleteCcopies of the data files and control filesDarchived redo log files that have multiple copies in a different archive location and not backed up

考题 单选题You enabled the flashback logging feature, but you have not specified the location of the flash recovery area. Which location would be used as the default location for the flash recovery area?()A  The location used for control files.B  The location used for redo log files.C  The location set by using $ORACLE_BASED  The location set by using $ORACLE_HOMEE  The location set by using CORE_DUMP_DESTF  The location set by using BACKGROUND_DUMP_DEST

考题 单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A  Enable audit object access and specify files and folders to monitor using Task Manager.B  Enable audit policy change and specify files and folders to monitor using Windows Explorer.C  Enable audit object access and specify files and folders to monitor using Windows Explorer.D  Open Performance Monitor and monitor folder activity.

考题 单选题After moving files from one folder to another, the technician cannot access them. Which of the following MUST the technician do to regain access to these files?()A In folder options, select show hidden files and folders.B Perform the transfer again.C Reboot the system; access will be reset automatically.D Take ownership of the files.

考题 单选题What is the default local location for syslog and trace files?()A /logB /home/logC /var/logD /etc/log

考题 多选题Which three statements are true about the stages of database startup?()AData files and redo log files can be renamed at the MOUNT stage.BControl files are read at the OPEN stage for the location of data files.CControl files are required to bring the database to the NOMOUNT stage.DData files and redo log files are made available to users at the OPEN stage.EData files and online redo log files are checked for consistency while opening the database

考题 多选题What does the Filesystem Hierarchy Standard enable? ()Asoftware to predict the location of installed files and directoriesBsoftware to predict the ownership and access rights to files and directoriesCusers to predict the location of installed files and directoriesDusers to predict how the filesystem should be formatted according to need

考题 单选题You decided to change the location of the flash recovery area. You executed the following command:   ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’+disk1’ SCOPE=BOTH SID=’*’;   Which statement is true?()A  The location can be changed only if the flash recovery area is empty.B  After executing the command, all new flash recovery area files will be created in the new location.C  The command will generate an error because you cannot change the flash recovery area while the database is open.D  All the existing files in the flash recovery area will be moved to the new location and all new Flash Recovery Area files will be created in the new location.