单选题A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()AThe user has a UID less than 200BThe user has been defined as an administrative userCThe file /usr/es/sbin/cluster/clpasswd is not executable by the userDThe user needs explicit authorization to change their password cluster-wide
单选题
A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()
A
The user has a UID less than 200
B
The user has been defined as an administrative user
C
The file /usr/es/sbin/cluster/clpasswd is not executable by the user
D
The user needs explicit authorization to change their password cluster-wide
参考解析
解析:
暂无解析
相关考题:
What is the effect of using the service password-encryption command?() A.Only passwords configured after the command has been entered will beencrypted.B.Only the enable password will be encrypted.C.Only the enable secret password will beencryptedD.It will encrypt the secret password and remove the enable secret password from the configuration.E.It will encrypt all current and future passwords.
What is the effect of using the service password-encryption command?()A、Only passwords configured after the command has been entered will beencrypted.B、Only the enable password will be encrypted.C、Only the enable secret password will beencryptedD、It will encrypt the secret password and remove the enable secret password from the configuration.E、It will encrypt all current and future passwords.
What is the effect of using the service password-encryption command?()A、nly passwords configured after the command has been entered will be encrypted.B、Only the enable password will be encrypted.C、Only the enable secret password will be encryptedD、It will encrypt the secret password and remove the enable secret password from the configuration.E、It will encrypt all current and future passwords.
What is the effect of using the service password-encryption command?()A、only passwords configured after the command has been entered will be encryptedB、Only the enable password will be encryptedC、Only the enable secret password will be encryptedD、It will encrypt the secret password and remove the enable secret password from the configurationE、It will encrypt all current and future passwords.
You are a Database Administrator with WonderWeb. You use a password file to establish connections to the Sales database located on the server. You created the password file using the following command: ORAPWD file=d:/oracle/ora9i/orapwU01 password=admin entries=4 You erroneously deleted the password file while the database was running. You re-create the password file using the following command: ORAPWD file=d:/oracle/ora9i/orapwU01 password=change_on_install entries=4 However, when you try to connect as the SYS user, you receive the following error: ORA-01031: insufficient privileges What should you do to resolve this error?()A、 Delete the newly created password file and re-create another password file with the password admin, without shutting down the database.B、 Enable the operating system authentication, shut down the database, disable the operating system authentication, and restart the database using the password file.C、 Enable the operating system authentication, shut down the database, re-create the password file using the same ORAPWD command, and restart the database using the password file.D、 Delete the newly created password file, enable operating system authentication and shut down the database. Then, re-create another password file using the same ORAPWD command and restart the database using this password file.
A system is being booted into maintenance mode due to root password recovery.After accessing the root volume group and starting a shell without mounting the file systems, what is the next step?()A、Delete root's password from the /etc/security/passwd fileB、Use the diag recovery tool option to reset root's passwordC、Execute the ‘passwd’ command and assign a new passwd to root UIDD、Mount the / and /usr filesystems on alternative mount points to edit the password file
A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A、The user has a UID less than 200B、The user has been defined as an administrative userC、The file /usr/es/sbin/cluster/clpasswd is not executable by the userD、The user needs explicit authorization to change their password cluster-wide
What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on the routerB、It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC、It specifies the login authentication list named console-in using the local username- password data base on the routerD、It specifies the login authorization method list named console-in using the local username- password data base on the router
What is the effect of using the service password-encryption command?()A、Onl ypasswords configured afte rthe command has been entered will be encrypted.B、Only the enable password will be encrypted.C、Only the enable secret password will be encryptedD、It will encrypt the secret password and remove the enable secret password from the configuration.E、It will encrypt all current and future passwords.
Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。A、~/ .rhostsB、$HOME/.netrcC、/etc/hosts.equivD、/etc/security/user
You were recently hired by Certkiller .com as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()A、 by using the STATUS command of the Listener control utilityB、 by using the STATUS L1 command of the Listener control utilityC、 by using the SHOW RULES command of the Listener control utilityD、 by using the SET PASSWORD command of the Listener control utilityE、 by searching for the PASSWORD_LISTENER entry in the listener.ora file
You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository. Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()A、 rman TARGET / NOCATALOGB、 rman TARGET sys/passwordC、 rman TARGET sys/password AS SYSDBAD、 rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat
The user HR owns the EMP table. The user HR grants privileges to the user SCOTT by using this command: SQL GRANT SELECT,INSERT,UPDATE ON emp TO scott WITH GRANT OPTION; The user SCOTT executes this command to grant privileges to the user JIM: SQL GRANT SELECT,INSERT,UPDATE ON hr.emp TO jim; Now, the user HR decides to revoke privileges from JIM using this command: SQL REVOKE SELECT,INSERT,UPDATE ON emp FROM jim; Which statement is true after HR issues the REVOKE command()A、The command fails because SCOTT still has privileges.B、The command succeeds and privileges are revoked from JIM.C、The command fails because HR cannot revoke the privileges from JIM.D、The command succeeds and only HR has the privilege to perform the SELECT, INSERT, and UPDATEoperations on the EMP table.
You previously secured your listener with an encrypted password. However, you need to set a new password for security reasons. What is the correct method for setting a new encrypted password for the listener using the Listener Control utility?()A、 executing the SET PASSWORD command and then the SAVE_CONFIG commandB、 executing the CHANGE_PASSWORD command and then the SAVE_CONFIG commandC、 executing the CHANGE_PASSWORD command and then the SET PASSWORD commandD、 executing the SET PASSWORD command, then the CHANGE_PASSWORD command and finally, the SAVE_CONFIG command
You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()A、Run ipconfig /flushdns at the command prompt. B、Reset the password for the local administrator user account. C、From the Internet Options in Internet Explorer, clear the AutoComplete history.D、From the Internet Options in Internet Explorer, delete the Temporary Internet Files.
You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You use a non-administrative user account named Joseph to log on to a client computer. You need to change the password for a domain user account named Sophia. You open the Active Directory Users and Computers console. When you attempt to change Sophia's password, you receive the following error message: "Access is denied". You need to remain logged on to the client computer as Joseph, and you need to be able to change Sophia's password. What should you do?()A、Add the non-administrative domain user account to the local Administrators group.B、Use the runas command to run Active Directory Users and Computers with domain administrative credentials.C、From a command prompt, run the net user Sophia /add /passwordreq:yes command.D、From a command prompt, run the net accounts /uniquepw: /domain command.
单选题A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()AThe user has a UID less than 200BThe user has been defined as an administrative userCThe file /usr/es/sbin/cluster/clpasswd is not executable by the userDThe user needs explicit authorization to change their password cluster-wide
单选题A system is being booted into maintenance mode due to root password recovery.After accessing the root volume group and starting a shell without mounting the file systems, what is the next step?()ADelete root's password from the /etc/security/passwd fileBUse the diag recovery tool option to reset root's passwordCExecute the ‘passwd’ command and assign a new passwd to root UIDDMount the / and /usr filesystems on alternative mount points to edit the password file
单选题What is the objective of the aaa authentication login console-in local command?()AIt specifies the login authentication method list named console-in using the local user database on the routerBIt specifies the login authorization method list named console-in using the local RADIUS username-password data baseCIt specifies the login authentication list named console-in using the local username- password data base on the routerDIt specifies the login authorization method list named console-in using the local username- password data base on the router
单选题You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository. Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()A rman TARGET / NOCATALOGB rman TARGET sys/passwordC rman TARGET sys/password AS SYSDBAD rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat
单选题A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()AThe user has a UID less than 200BThe user has been defined as an administrative userCThe file /usr/es/sbin/cluster/clpasswd is not executable by the userDThe user needs explicit authorization to change their password cluster-wide
单选题Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。A~/ .rhostsB$HOME/.netrcC/etc/hosts.equivD/etc/security/user
单选题You previously secured your listener with an encrypted password. However, you need to set a new password for security reasons. What is the correct method for setting a new encrypted password for the listener using the Listener Control utility?()A executing the SET PASSWORD command and then the SAVE_CONFIG commandB executing the CHANGE_PASSWORD command and then the SAVE_CONFIG commandC executing the CHANGE_PASSWORD command and then the SET PASSWORD commandD executing the SET PASSWORD command, then the CHANGE_PASSWORD command and finally, the SAVE_CONFIG command
单选题What is the effect of using the service password-encryption command?()Aonly passwords configured after the command has been entered will be encryptedBOnly the enable password will be encryptedCOnly the enable secret password will be encryptedDIt will encrypt the secret password and remove the enable secret password from the configurationEIt will encrypt all current and future passwords.
单选题The user HR owns the EMP table. The user HR grants privileges to the user SCOTT by using this command: SQL GRANT SELECT,INSERT,UPDATE ON emp TO scott WITH GRANT OPTION; The user SCOTT executes this command to grant privileges to the user JIM: SQL GRANT SELECT,INSERT,UPDATE ON hr.emp TO jim; Now, the user HR decides to revoke privileges from JIM using this command: SQL REVOKE SELECT,INSERT,UPDATE ON emp FROM jim; Which statement is true after HR issues the REVOKE command()AThe command fails because SCOTT still has privileges.BThe command succeeds and privileges are revoked from JIM.CThe command fails because HR cannot revoke the privileges from JIM.DThe command succeeds and only HR has the privilege to perform the SELECT, INSERT, and UPDATEoperations on the EMP table.
单选题You are a Database Administrator with WonderWeb. You use a password file to establish connections to the Sales database located on the server. You created the password file using the following command: ORAPWD file=d:/oracle/ora9i/orapwU01 password=admin entries=4 You erroneously deleted the password file while the database was running. You re-create the password file using the following command: ORAPWD file=d:/oracle/ora9i/orapwU01 password=change_on_install entries=4 However, when you try to connect as the SYS user, you receive the following error: ORA-01031: insufficient privileges What should you do to resolve this error?()A Delete the newly created password file and re-create another password file with the password admin, without shutting down the database.B Enable the operating system authentication, shut down the database, disable the operating system authentication, and restart the database using the password file.C Enable the operating system authentication, shut down the database, re-create the password file using the same ORAPWD command, and restart the database using the password file.D Delete the newly created password file, enable operating system authentication and shut down the database. Then, re-create another password file using the same ORAPWD command and restart the database using this password file.
单选题A system is being booted into maintenance mode due to root password recovery. After accessing the root volume group and starting a shell without mounting the file systems, what is the next step?()ADelete root’s password from the /etc/security/passwd file.BUse the diag recovery tool option to reset root’s password.CExecute the ’passwd’ command and assign a new passwd to root UIdDMount the / and /usr filesystems on alternative mount points to edit the password file.
单选题You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You use a non-administrative user account named Joseph to log on to a client computer. You need to change the password for a domain user account named Sophia. You open the Active Directory Users and Computers console. When you attempt to change Sophia's password, you receive the following error message: "Access is denied". You need to remain logged on to the client computer as Joseph, and you need to be able to change Sophia's password. What should you do?()AAdd the non-administrative domain user account to the local Administrators group.BUse the runas command to run Active Directory Users and Computers with domain administrative credentials.CFrom a command prompt, run the net user Sophia /add /passwordreq:yes command.DFrom a command prompt, run the net accounts /uniquepw: /domain command.