单选题A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()AThe user has a UID less than 200BThe user has been defined as an administrative userCThe file /usr/es/sbin/cluster/clpasswd is not executable by the userDThe user needs explicit authorization to change their password cluster-wide

单选题
A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()
A

The user has a UID less than 200

B

The user has been defined as an administrative user

C

The file /usr/es/sbin/cluster/clpasswd is not executable by the user

D

The user needs explicit authorization to change their password cluster-wide


参考解析

解析: 暂无解析

相关考题:

In your database, the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:Which authentication method would be used first?()A. authentication by password fileB. authentication by using certificates over SSLC. authentication by using the Oracle Internet DirectoryD. authentication by using the local OS of the database server

What is the effect of using the service password-encryption command?()A、Only passwords configured after the command has been entered will beencrypted.B、Only the enable password will be encrypted.C、Only the enable secret password will beencryptedD、It will encrypt the secret password and remove the enable secret password from the configuration.E、It will encrypt all current and future passwords.

What is the effect of using the service password-encryption comma()。A、Only the enable password will be encrypted.B、Only the enable secret password will be encrypted.C、Only passwords configured after the command has been entered will be encrypted.D、It will encrypt the secret password and remove the enable secret password fromthe configuration.E、It will encrypt all current and future passwords.

What is the effect of using the service password-encryption command?()A、only passwords configured after the command has been entered will be encryptedB、Only the enable password will be encryptedC、Only the enable secret password will be encryptedD、It will encrypt the secret password and remove the enable secret password from the configurationE、It will encrypt all current and future passwords.

Companycom has been performing scheduled backups of their data to tape using "tar" in a script for over one year with no problems. Recently, the tar command is returning a non zero return code during the backup phase, causing the script to fail. What is the primary cause of this problem?()A、The files have grown to over eight gigabytes in sizeB、The file systems are corrupt, and fsck should be runC、The tape block size has been changed from the defaultD、The user’s limit has been changed to less than eight gigabytes

You are a Database Administrator with WonderWeb. You use a password file to establish connections to the Sales database located on the server. You created the password file using the following command:        ORAPWD file=d:/oracle/ora9i/orapwU01 password=admin entries=4   You erroneously deleted the password file while the database was running. You re-create the password file using the following command:   ORAPWD file=d:/oracle/ora9i/orapwU01 password=change_on_install entries=4   However, when you try to connect as the SYS user, you receive the following error:        ORA-01031: insufficient privileges   What should you do to resolve this error?()A、 Delete the newly created password file and re-create another password file with the password admin, without shutting down the database.B、 Enable the operating system authentication, shut down the database, disable the operating system authentication, and restart the database using the password file.C、 Enable the operating system authentication, shut down the database, re-create the password file using the same ORAPWD command, and restart the database using the password file.D、 Delete the newly created password file, enable operating system authentication and shut down the database. Then, re-create another password file using the same ORAPWD command and restart the database using this password file.

A system is being booted into maintenance mode due to root password recovery.After accessing the root volume group and starting a shell without mounting the file systems, what is the next step?()A、Delete root's password from the /etc/security/passwd fileB、Use the diag recovery tool option to reset root's passwordC、Execute the ‘passwd’ command and assign a new passwd to root UIDD、Mount the / and /usr filesystems on alternative mount points to edit the password file

A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A、The user has a UID less than 200B、The user has been defined as an administrative userC、The file /usr/es/sbin/cluster/clpasswd is not executable by the userD、The user needs explicit authorization to change their password cluster-wide

What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on the routerB、It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC、It specifies the login authentication list named console-in using the local username- password data base on the routerD、It specifies the login authorization method list named console-in using the local username- password data base on the router

A user has used all of the allowed logon attempts for the userid. Which command can be used to reset the unsuccessful_login_count to 0 for that user?()A、usrckB、chsecC、chuserD、passwd

Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。A、~/ .rhostsB、$HOME/.netrcC、/etc/hosts.equivD、/etc/security/user

Examine the command: SQL ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()A、The SKD user cannot log in to the database instance.B、The objects owned by the SKD user are not accessible to any user.C、The other users can access the objects owned by the SKD user, on which they have access.D、The password for the SKD user expires and the user is forced to change the password at the next log in

You were recently hired by Certkiller .com as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()A、 by using the STATUS command of the Listener control utilityB、 by using the STATUS L1 command of the Listener control utilityC、 by using the SHOW RULES command of the Listener control utilityD、 by using the SET PASSWORD command of the Listener control utilityE、 by searching for the PASSWORD_LISTENER entry in the listener.ora file

In your database,the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:$ SQLPLUS scott/tiger@DB01 AS SYSDBA   where DB01 is the net service name.   Which authentication method would be used first?()  A、 authentication by password fileB、 authentication by using certificates over SSLC、 authentication by using the Oracle Internet DirectoryD、 authentication by using the local OS of the database server

You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository.  Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()A、 rman TARGET / NOCATALOGB、 rman TARGET sys/passwordC、 rman TARGET sys/password AS SYSDBAD、 rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat

You previously secured your listener with an encrypted password. However, you need to set a new password for security reasons. What is the correct method for setting a new encrypted password for the listener using the Listener Control utility?()A、 executing the SET PASSWORD command and then the SAVE_CONFIG commandB、 executing the CHANGE_PASSWORD command and then the SAVE_CONFIG commandC、 executing the CHANGE_PASSWORD command and then the SET PASSWORD commandD、 executing the SET PASSWORD command, then the CHANGE_PASSWORD command and finally, the SAVE_CONFIG command

单选题You were recently hired by an organization as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()Aby using the STATUS command of the Listener control utilityBby using the STATUS L1 command of the Listener control utilityCby using the SHOW RULES command of the Listener control utilityDby using the SET PASSWORD command of the Listener control utilityEby searching for the PASSWORD_LISTENER entry in the listener.ora file

单选题You previously secured your listener with an encrypted password. However, you need to set a new password for security reasons. What is the correct method for setting a new encrypted password for the listener using the Listener Control utility?()A executing the SET PASSWORD command and then the SAVE_CONFIG commandB executing the CHANGE_PASSWORD command and then the SAVE_CONFIG commandC executing the CHANGE_PASSWORD command and then the SET PASSWORD commandD executing the SET PASSWORD command, then the CHANGE_PASSWORD command and finally, the SAVE_CONFIG command

单选题Companycom has been performing scheduled backups of their data to tape using "tar" in a script for over one year with no problems. Recently, the tar command is returning a non zero return code during the backup phase, causing the script to fail. What is the primary cause of this problem?()AThe files have grown to over eight gigabytes in sizeBThe file systems are corrupt, and fsck should be runCThe tape block size has been changed from the defaultDThe user’s limit has been changed to less than eight gigabytes

单选题What is the effect of using the service password-encryption comma()。AOnly the enable password will be encrypted.BOnly the enable secret password will be encrypted.COnly passwords configured after the command has been entered will be encrypted.DIt will encrypt the secret password and remove the enable secret password fromthe configuration.EIt will encrypt all current and future passwords.

单选题Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。A~/ .rhostsB$HOME/.netrcC/etc/hosts.equivD/etc/security/user

单选题You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository.  Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()A rman TARGET / NOCATALOGB rman TARGET sys/passwordC rman TARGET sys/password AS SYSDBAD rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat

单选题What is the effect of using the service password-encryption command?()Aonly passwords configured after the command has been entered will be encryptedBOnly the enable password will be encryptedCOnly the enable secret password will be encryptedDIt will encrypt the secret password and remove the enable secret password from the configurationEIt will encrypt all current and future passwords.

单选题What is the objective of the aaa authentication login console-in local command?()AIt specifies the login authentication method list named console-in using the local user database on the routerBIt specifies the login authorization method list named console-in using the local RADIUS username-password data baseCIt specifies the login authentication list named console-in using the local username- password data base on the routerDIt specifies the login authorization method list named console-in using the local username- password data base on the router

单选题A system is being booted into maintenance mode due to root password recovery.  After accessing the root volume group and starting a shell without mounting the file systems, what is the next step?()ADelete root’s password from the /etc/security/passwd file.BUse the diag recovery tool option to reset root’s password.CExecute the ’passwd’ command and assign a new passwd to root UIdDMount the / and /usr filesystems on alternative mount points to edit the password file.

单选题The user HR owns the EMP table. The user HR grants privileges to the user SCOTT by using this command:  SQL GRANT SELECT,INSERT,UPDATE ON emp TO scott WITH GRANT OPTION; The user SCOTT executes this command to grant privileges to the user JIM: SQL GRANT SELECT,INSERT,UPDATE ON hr.emp TO jim;  Now, the user HR decides to revoke privileges from JIM using this command: SQL REVOKE SELECT,INSERT,UPDATE ON emp FROM jim; Which statement is true after HR issues the REVOKE command()AThe command fails because SCOTT still has privileges.BThe command succeeds and privileges are revoked from JIM.CThe command fails because HR cannot revoke the privileges from JIM.DThe command succeeds and only HR has the privilege to perform the SELECT, INSERT, and UPDATEoperations on the EMP table.

单选题What is the effect of using the service password-encryption command?()Anly passwords configured after the command has been entered will be encrypted.BOnly the enable password will be encrypted.COnly the enable secret password will be encryptedDIt will encrypt the secret password and remove the enable secret password from the configuration.EIt will encrypt all current and future passwords.