单选题Which files are managed through the use of the file collection "HACMP_Files"?()AThe PowerHA Global ODM.BSystem networking files including /etc/hosts, /etc/inetd.conf and /etc/servicesCSecurity files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/groupDUser configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts
单选题
Which files are managed through the use of the file collection "HACMP_Files"?()
A
The PowerHA Global ODM.
B
System networking files including /etc/hosts, /etc/inetd.conf and /etc/services
C
Security files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/group
D
User configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts
参考解析
解析:
暂无解析
相关考题:
Whichofthefollowingfilesshouldbeeditedtodisableremotemachinesfromperforminga"finger"onasystem?() A./etc/security/userB./etc/servicesC./etc/inetd.confD./etc/hosts.equiv
During the boot process, which of the following files should be sued to control system initialization and start daemons and subsystems?() A./etc/inittabB./etc/rc.bootC./etc/servicesD./etc/environment
Whichfilesaremanagedthroughtheuseofthefilecollection"HACMP_Files"?() A.ThePowerHAGlobalODM.B.Systemnetworkingfilesincluding/etc/hosts,/etc/inetd.confand/etc/servicesC.Securityfilesincluding/etc/passwd,/etc/security/passwd,/etc/groupand/etc/security/groupD.UserconfigurablefilesincludingApplicationserverstartandstopscripts,custompreandpostnotificationeventsandapplicationmonitoringscripts
下面()文件中包含用户id(uid),工作目录,和登录后的shell信息。A、/etc/security/passwdB、/etc/security/userC、/etc/security/environD、/etc/passwd
During the boot process, which of the following files should be sued to control system initialization and start daemons and subsystems?()A、/etc/inittabB、/etc/rc.bootC、/etc/servicesD、/etc/environment
Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A、/etc/security/userB、/etc/servicesC、/etc/inetd.confD、/etc/hosts.equiv
Which of the following files should contain the statement "hosts=local, bind"?()A、/etc/hostsB、/etc/irs.confC、/etc/netsvc.confD、/etc/resolv.conf
To disable all tcpip deamons that are not required on a server, which of the following files should be edited?()A、/etc/rc.nfsB、/etc/rc.tcpipC、/etc/rc.netD、/etc/inetd.conf
Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。A、~/ .rhostsB、$HOME/.netrcC、/etc/hosts.equivD、/etc/security/user
Which files are managed through the use of the file collection "HACMP_Files"?()A、The PowerHA Global ODM.B、System networking files including /etc/hosts, /etc/inetd.conf and /etc/servicesC、Security files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/groupD、User configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user
The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?() A、 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B、 Use C-SPOC to synchronize the password files between cluster nodes.C、 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D、 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.
Which of the following files contains the settings for the system’s DNS domain name and DNS servers?()A、/etc/hostsB、/etc/resolv.confC、/etc/netsvc.confD、/etc/named.boot
To enable the SNMP daemon during system startup, which of the following files should be modified?()A、/etc/rc.netB、/etc/rc.nfsC、/etc/rc.tcpipD、/etc/inetd.conf
Which of the following files should be edited to enable SNMP?()A、/etc/rc.nfsB、/etc/rc.tcpipC、/etc/rc.netD、/etc/inetd.conf
Which files can be used together to allow remote command execution on a server?() A、/etc/.rhosts and $HOME/hosts.equivB、/etc/hosts.equiv and $HOME/.rhostsC、/etc/rhosts.equiv and $HOST/.rhostsD、/etc/hosts.equiv and $HOME/.hosts.equiv
单选题Which of the following files should contain the statement "hosts=local, bind"?()A/etc/hostsB/etc/irs.confC/etc/netsvc.confD/etc/resolv.conf
单选题Which of the following files contains the settings for the system’s DNS domain name and DNS servers?()A/etc/hostsB/etc/resolv.confC/etc/netsvc.confD/etc/named.boot
单选题A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A/etc/security/limitsB/etc/security/mkuser.sysC/etc/security/privD/etc/security/user
单选题Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。A~/ .rhostsB$HOME/.netrcC/etc/hosts.equivD/etc/security/user
单选题To disable all tcpip deamons that are not required on a server, which of the following files should be edited?()A/etc/rc.nfsB/etc/rc.tcpipC/etc/rc.netD/etc/inetd.conf
单选题To enable the SNMP daemon during system startup, which of the following files should be modified?()A/etc/rc.netB/etc/rc.nfsC/etc/rc.tcpipD/etc/inetd.conf
单选题During the boot process, which of the following files should be sued to control system initialization and start daemons and subsystems?()A/etc/inittabB/etc/rc.bootC/etc/servicesD/etc/environment
单选题Which of the following files should be edited to enable SNMP?()A/etc/rc.nfsB/etc/rc.tcpipC/etc/rc.netD/etc/inetd.conf
单选题Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A/etc/security/userB/etc/servicesC/etc/inetd.confD/etc/hosts.equiv
单选题Which files can be used together to allow remote command execution on a server?()A/etc/.rhosts and $HOME/hosts.equivB/etc/hosts.equiv and $HOME/.rhostsC/etc/rhosts.equiv and $HOST/.rhostsD/etc/hosts.equiv and $HOME/.hosts.equiv
单选题The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()A On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B Use C-SPOC to synchronize the password files between cluster nodes.C On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.