单选题A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()Aremove all other groups from the systemBrun the command mkuser -default GROUP=databaseCchange the default group in /usr/lib/security/mkuser.defaultDedit /etc/security/group to move all users to the database stanza
单选题
A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()
A
remove all other groups from the system
B
run the command mkuser -default GROUP=database
C
change the default group in /usr/lib/security/mkuser.default
D
edit /etc/security/group to move all users to the database stanza
参考解析
解析:
暂无解析
相关考题:
You are the network administrator for Ezonexam. The network consists of a single Active Directory domain Ezonexam.com. All network servers run Windows Server 2000.Your network includes a shared folder named EzonexamDocs. This folder must not be visible in a browse list.However, users report that they can see EzonexamDocs when they browse for shared folders.How should you solve this problem?A.Modify the share permissions to remove the All - Read permission on EzonexamDocs from the Users group.B.Modify the NTFS permissions to remove the Allow - Read permissions on EzonexamDocs from the Users group.C.Change the share name to EzonexamDocs #.D.Change the share name to EzonexamDocs $.
You need to design a configuration for Exchange Server storage that meets the business and technical requirements. What should you do?()A、Create a single storage group. Create one database for all usersB、Create two storage groups. In each storage group, create one database. Place mailboxes for remote users in one storage group database, and place all other mailboxes in the other storage group databaseC、Create two storage groups. In each storage group, create one database. Place executive mailboxes in one storage group database, and place all other mailboxes in the other storage group databaseD、Create two storage groups. In one storage group, create a database, and place all mailboxes for remote users and executives in the database. In the other storage group, create a database for all other mailboxes
An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()A、odmgetB、odmaddC、odmshowD、odmcreate
You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. The functional level of the domain is Windows 2000 native. A global group named Travelling contains 7,000 users. All of these users are assigned portable computers, which they will use to run new POSIX-compliant application. You create a global group named POSIX. For all 7,000 users in Travelling, you change the primary group to POSIX. Members of Travelling now report that they cannot access necessary domain resources. How should you solve this problem?()A、Ensure that each site on your network is connected to at least one other site by a replication link that uses the SMTP protocol.B、Create two new global groups, Travelling1 and Travelling2. Place one half of the members of Travelling in each new group. Then place both new groups in Travelling.C、Remove all domain users from the Users group, and then add all domain users to the group again.D、Remove all users from Travelling. Change Travelling to a universal group. Add the same users to the new Travelling group.
Your network contains an Active Directory domain. The domain contains a group named Group1. The minimum password lenght for the domain is set to six characters. you need to ensure that the passwords for all users in Group1 are at least 10 characters long. All other users must be able to use passwords that are six characters long. What should you do first()A、Run the New-ADFineGrainedPasswordPolicy cmdlet.B、Run the Add-ADFineGrainedPasswordPolicySubject cmdlet.C、From the Default Domain Policy, modify the password policy.D、From the Default Domain Controller Policy, modify the password policy.
A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()A、remove all other groups from the systemB、run the command mkuser -default "GROUP=database"C、change the default group in /usr/lib/security/mkuser.defaultD、edit /etc/security/group to move all users to the database stanza
For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. Which of the following options would enable a five minute timeout for all users()A、Add the following line to /etc/environment: TMOUT=300B、Add the following lines to /.profile TMOUT=5 export TMOUTC、Run the following command: chuser -u ALL -a TIMEOUT=5MD、Run the following command: chsec -u ALL -a TIMEOUT=600
A system administrator wants to couple two servers together so that users from server A can access server B without entering their password. How would this be accomplished?()A、employ NIS to synchronize user names and passwordsB、create a /.rhosts on server A and serve BC、create a $HOME/.netrc for all users on server A and serve rBD、create a /etc/hosts.equiv on server A and server B
A system administrator would like to modify the system default user characteristics so that each new user will now be assigned (by default) the csh shell rather than the ksh shell. Which of the following actions should be performed?()A、Run the command chlogin -shell "csh"B、Run the command mkuser -default "SHELL=csh"C、Edit /etc/passwd and change all "ksh" entries to "csh"D、Modify the contents of /usr/lib/security/mkuser.default file
In your database, online redo log files are multiplexed and one of the members in a group is lost due to media failure? How would you recover the lost redo log member?()A、 import the database from the last exportB、 restore all the members in the group from the last backupC、 drop the lost member from the database and then add a new member to the groupD、 restore all the database files from the backup and then perform a complete recoveryE、 restore all the database files from the backup and then perform an incomplete recovery
You have an Automatic Storage Management (ASM) instance managing the database files of your production database. The database contains ASM files and non-ASM files. Using Recovery Manager (RMAN), you migrate the complete production database to use the ASM instance. Which statement is true? ()A、 RMAN would relocate all the data files to an ASM disk group and other files to an operating system location, defined using Oracle Managed Files (OMF).B、 RMAN would relocate the ASM files to an ASM disk group and the non-ASM files to an operating system location, defined using OMFC、 RMAN would relocate all the database files to an ASM disk group.D、 RMAN would change the file definitions in the control file to use the ASM but would not relocate the database files physically.
In which scenario is a Database Administrator NOT required to perform an incomplete recovery?()A、 when all the online redo log groups are multiplexed and one of the members of a group is missingB、 when all the online redo log groups are not multiplexed and one log group is missingC、 when all the control files are missingD、 when some important tables are deleted from the database and purged from the Recycle Bin
You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A new management directive states that users can log to the domain only during business hours. Users who remain logged on after business hours must be automatically disconnected from network resources. You need to enforce this directive by using the minimum amount of administrative effort. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two)A、Configure the Default Domain Policy Group Policy object (GPO) to increase scheduling priority for all users.B、Configure the Default Domain Policy Group Policy object (GPO) to force users to log off when their logon hours expire.C、Select all user accounts. Modify the account properties to restrict logon hours to business hours.D、Create a domain user account named Temp. Configure the account properties to restrict logon hours to business hours.E、Modify the DACL on the Default Domain Policy Group Policy object (GPO) to assign the Allow - Read permission to the Users group.
You are a system administrator at Company. The network includes 100 Windows 2000 Professional computers. A user named Peter wants to share a local printing device directly connected to his computer. Peter needs to share this device among three groups: Engineering, Accounting, and Operations. Peter wants to delegate printer administration to one print administrator from each group. Each print administrator must be able to delete print jobs generated by their own group on the print device. They should not be able to delete print jobs from other groups. You want to configure Peter’s client computer to support these requirements. What should you do? ()A、 Create a single shared printer to be used by all three groups.Allow each print administrator Manage Documents permission. B、 Create a separate shared printer for each group. For each shared printer, allow the respective print administrator Manage Documents permission. C、 Create a single shared printer to be used by all three groups. Add the print administrator’s user account from each group to the Power Users group on Peter’s client computer. D、 Create a separate shared printer for each group. Add the print administrator’s user account from each group to the Power Users group on Peter’s client computer.
You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. Your network includes a shared folder named TestKingDocs. This folder must not be visible in a browse list. However, users report that they can see TestKingDocs when they browse for shared folders. How should you solve this problem?()A、Modify the share permissions to remove the All - Read permission on TestKingDocs from the Users group.B、Modify the NTFS permissions to remove the Allow - Read permissions on TestKingDocs from the Users group.C、Change the share name to TestKingDocs#.D、Change the share name to TestKingDocs$.
单选题You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. The functional level of the domain is Windows 2000 native. A global group named Travelling contains 7,000 users. All of these users are assigned portable computers, which they will use to run new POSIX-compliant application. You create a global group named POSIX. For all 7,000 users in Travelling, you change the primary group to POSIX. Members of Travelling now report that they cannot access necessary domain resources. How should you solve this problem?()AEnsure that each site on your network is connected to at least one other site by a replication link that uses the SMTP protocol.BCreate two new global groups, Travelling1 and Travelling2. Place one half of the members of Travelling in each new group. Then place both new groups in Travelling.CRemove all domain users from the Users group, and then add all domain users to the group again.DRemove all users from Travelling. Change Travelling to a universal group. Add the same users to the new Travelling group.
单选题You are a system administrator at ExamSheet. The network includes 100 Windows 2000 Professional computers. A user named Peter wants to share a local printing device directly connected to his computer. Peter needs to share this device among three groups: Engineering, Accounting, and Operations. Peter wants to delegate printer administration to one print administrator from each group. Each print administrator must be able to delete print jobs generated by their own group on the print device. They should not be able to delete print jobs from other groups. You want to configure Peter’s client computer to support these requirements. What should you do?()ACreate a single shared printer to be used by all three groups. Allow each print administrator Manage Documents permission. BCreate a separate shared printer for each group. For each shared printer, allow the respective print administrator Manage Documents permission. CCreate a single shared printer to be used by all three groups. Add the print administrator’s user account from each group to the Power Users group on Peter’s client computer. DCreate a separate shared printer for each group. Add the print administrator’s user account from each group to the Power Users group on Peter’s client computer.
单选题A system administrator would like to modify the system default user characteristics so that each new user will now be assigned (by default) the csh shell rather than the ksh shell. Which of the following actions should be performed?()ARun the command chlogin -shell cshBRun the command mkuser -default SHELL=cshCEdit /etc/passwd and change all ksh entries to cshDModify the contents of /usr/lib/security/mkuser.default file
单选题A system administrator wants to couple two servers together so that users from server A can access server B without entering their password. How would this be accomplished?()Aemploy NIS to synchronize user names and passwordsBcreate a /.rhosts on server A and serve BCcreate a $HOME/.netrc for all users on server A and serve rBDcreate a /etc/hosts.equiv on server A and server B
单选题You are using Resource Manager to manage system resources. While creating a new database user, you observe that the user is a member of DEFAULT_CONSUMER_GROUP by default. What would be the implications of this?()AThe Resource Manager plan does not affect the user.BThere must be a plan directive in any of the plans of the group to control the resources.CThe members of the group DEFAULT_CONSUMER_GROUP always have resource restrictions.DThe members of DEFAULT_CONSUMER_GROUP are restrained from accessing the system tables.EThe members of this group can change their group without the database administrator’s intervention.
单选题You have an Automatic Storage Management (ASM) instance managing the database files of your production database. The database contains ASM files and non-ASM files. Using Recovery Manager (RMAN), you migrate the complete production database to use the ASM instance. Which statement is true? ()A RMAN would relocate all the data files to an ASM disk group and other files to an operating system location, defined using Oracle Managed Files (OMF).B RMAN would relocate the ASM files to an ASM disk group and the non-ASM files to an operating system location, defined using OMFC RMAN would relocate all the database files to an ASM disk group.D RMAN would change the file definitions in the control file to use the ASM but would not relocate the database files physically.
单选题In your database, online redo log files are multiplexed and one of the members in a group is lost due to media failure. How would you recover the lost redo log member?()Aimport the database from the last exportBrestore all the members in the group from the last backupCdrop the lost member from the database, and then add a new member to the groupDrestore all the database files from the backup, and then perform a complete recovery Erestore all the database files from the backup, and then perform an incomplete recovery
单选题You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. Your network includes a shared folder named TestKingDocs. This folder must not be visible in a browse list. However, users report that they can see TestKingDocs when they browse for shared folders. How should you solve this problem?()AModify the share permissions to remove the All - Read permission on TestKingDocs from the Users group.BModify the NTFS permissions to remove the Allow - Read permissions on TestKingDocs from the Users group.CChange the share name to TestKingDocs#.DChange the share name to TestKingDocs$.
单选题You need to design a configuration for Exchange Server storage that meets the business and technical requirements. What should you do?()ACreate a single storage group. Create one database for all usersBCreate two storage groups. In each storage group, create one database. Place mailboxes for remote users in one storage group database, and place all other mailboxes in the other storage group databaseCCreate two storage groups. In each storage group, create one database. Place executive mailboxes in one storage group database, and place all other mailboxes in the other storage group databaseDCreate two storage groups. In one storage group, create a database, and place all mailboxes for remote users and executives in the database. In the other storage group, create a database for all other mailboxes
单选题In which scenario is a Database Administrator NOT required to perform an incomplete recovery?()A when all the online redo log groups are multiplexed and one of the members of a group is missingB when all the online redo log groups are not multiplexed and one log group is missingC when all the control files are missingD when some important tables are deleted from the database and purged from the Recycle Bin
单选题In your database, online redo log files are multiplexed and one of the members in a group is lost due to media failure? How would you recover the lost redo log member?()A import the database from the last exportB restore all the members in the group from the last backupC drop the lost member from the database and then add a new member to the groupD restore all the database files from the backup and then perform a complete recoveryE restore all the database files from the backup and then perform an incomplete recovery
单选题An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()AodmgetBodmaddCodmshowDodmcreate