单选题An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following ?n?command failed to create the link.ln/db/v9.7/install/config /etc/db_conf. Which option should be used when re-running the command to resolve the problem?()A-s flag to create a soft linkB-n flag to force create a hard linkC-N flag to force create a hard linkD-S flag to force create a soft link

单选题
An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following ?n?command failed to create the link.ln/db/v9.7/install/config /etc/db_conf. Which option should be used when re-running the command to resolve the problem?()
A

-s flag to create a soft link

B

-n flag to force create a hard link

C

-N flag to force create a hard link

D

-S flag to force create a soft link


参考解析

解析: 暂无解析

相关考题:

Which UNIX command creates a symbolic link named myfile in the current directory to the file/etc/hosts?A.In -s/etc/hosts myfileB.In -s myfile/etc/hostsC.link -s/etc/hosts myfileD.link -s myfile/etc/hosts

A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with apermission error message.What action will resolve the problem?() A.Add root user to the /etc/hosts.equiv on serverBB.Create $HOME/.rhosts file for the root user on serverBC.Restart the rshd daemon with root enabled option on serverBD.Add entry to allow root user from serverA to the /etc/hosts.allow on serverB

An administrator attempts a traceroute but receives a "Destination Unreadable" messagE.Which protocol is responsible for that message?() A.RARPB.RUDPC.ICMPD.SNMP

You are designing a strategy to address the requirements of the advertising department.  What should you do? ()A、 Create a GPO and link it to the Denver site.B、 Create a GPO and link it to the Advertising OU.C、 Create a GPO and link it to the graphicdesigninstitute.com domain.D、 Configure the Default Domain Policy to have the No Override option.E、 Use block inheritance to prevent the GPO from applying to members of the advertising department.

以下Gr配置中属于MTP3 Management的为()。A、List Load ShareB、Create Link setC、Create Signaling pointD、Create GT Conversion rule

An administrator attempts a traceroute but receives a "Destination Unreadable" message. Which protocol is responsible for that message?()A、RARPB、RUDPC、ICMPD、SNMP

he system administrator is making system wide changes to a server, which will add to the PATH variable for the server environment.  Where is the PATH variable found for the system?()A、/profileB、/etc/envpathC、/etc/profileD、/etc/environment

A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

What is the process for creating an NFS mount between two servers in the same network zone?()A、Export the desired filesystem in the /etc/nfs file, run ’exportfs -a’,create a mount directory on the desired server, and mount the NFS filesystem.B、Run ’exportfs -a’,export the desired filesystem in the /etc/nfs file,create a mount directory on the desired server, and mount the NFS filesystem.C、Export the desired filesystem in the /etc/exports file, run ’exportfs -a’,create a mount directory on the desired server,and mount the NFS filesystem.D、Run ’exportfs -u’,export the desired filesystem in the /etc/exports file, create a mount directory on the desired server,and mount the NFS filesystem.

A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh  commands by the root user return with a permission error message. What action will resolve the problem?()A、Add root user to the /etc/hosts.equiv on serverB .B、Create $HOME/.rhosts file for the root user on serverB .C、Restart the rshd daemon with root enabled option on serverB .D、Add entry to allow root user from serverA to the /etc/hosts.allow on serverB .

A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

A system administrator wants to couple two servers together so that users from server A can access server B without entering their password. How would this be accomplished?()A、employ NIS to synchronize user names and passwordsB、create a /.rhosts on server A and serve BC、create a $HOME/.netrc for all users on server A and serve rBD、create a /etc/hosts.equiv on server A and server B

An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following command failed to create the link:  ln /db/v9.7/install/config /etc/db_conf   Which option should be used when re-running the command to resolve the problem?()  A、-s flag to create a soft linkB、-n flag to force create a hard linkC、-N flag to force create a hard linkD、-S flag to force create a soft link

An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following ?n?command failed to create the link.ln/db/v9.7/install/config /etc/db_conf. Which option should be used when re-running the command to resolve the problem?()A、-s flag to create a soft linkB、-n flag to force create a hard linkC、-N flag to force create a hard linkD、-S flag to force create a soft link

The system administrator is making system wide changes to a server, which will add to the PATH variable for the server environment. Where is the PATH variable found for the system?()A、/profileB、/etc/envpathC、/etc/profileD、/etc/environment

You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPOB、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOC、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOD、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

You are designing for implementing Group Policy objects (GPOs) to meet the business and technical requirement. What should you do?()A、Create one new GPO to enforce software restriction policies. Link this GPO to the domain.B、Create one new GPO to enforce software restriction policies. Link this GPO to the appropriate  organizational unit (OU).C、Create one new GPO to enforce software restriction policies. Link this GPO to all organizational units (OUs).D、Create new GPOs to match the number of organizational units (OUs).configure these GPOs to enforce software restriction policies. Link this GPO to its respective OU.

All consultants belong to a global group named TempWorkers.     You place three file servers in a new organizational unit named SecureServers. The three file  servers contain confidential data located in shared folders.     You need to record any failed attempts made by the consultants to access the confidential data.     Which two actions should you perform()A、Create and link a new GPO to the SecureServers organizational unit. Configure the Audit privilege use Failure audiB、Create and link a new GPO to the SecureServers organizational unit. Configure the Audit object access Failure audC、Create and link a new GPO to the SecureServers organizational unit. Configure the Deny access to this computer fD、On each shared folder on the three file servers, add the three servers to the Auditing tab.  Configure the Failed Full control setting in the Auditing Entry dialog box.E、On each shared folder on the three file servers, add the TempWorkers global group to the Auditing tab. Configure th

A system administrator has created tty2 on a serial port connection to a system.  When attempting to verify the connection the following error is observed:   # cu -ml tty2   cu: 0835-028 The connection failed. NO DEVICES AVAILABLE. Which of the following should be performed to correct this error?()A、Create an entry for tty2 in the /etc/uucp/Devices fileB、Re-enter the command as "cu -dml tty2"C、Create an entry for tty2 in the /etc/uucp/Systems fileD、Re-enter the command as "cu -s 9600 -dh -t -l tty2"

What system startup file would an administrator edit for starting up miscellaneous third party applications?()A、/etc/rc.netB、/etc/rc.bootC、/etc/rc.localD、/etc/rc.tcpip

You are the administrator of a SQL Server 2005 computer named SQL1. SQL1 is a member of a Microsoft Active Directory domain. You do not have any rights or privileges to perform domain administration. However, you have been granted membership in the local Administrators group on SQL1. You perform most of the management of SQL1 from your administrative workstation. However, for security reasons, you want to track all attempts for interactive logons and network connections to SQL1. What should you do?()A、Create a Group Policy object (GPO) that is configured for success and failure auditing of the Audit account logon events setting. Ask the domain administrator to link the GPO to the object containing SQL1.B、Configure the SQL Server service on SQL1 to audit all successful and failed logon attempts.C、Edit the local security policy of SQL1. Then, configure success and failure auditing on the Audit logon events setting.D、Run the SQL Server Profiler and use a standard default template.

多选题To save time configuring some custom network facilities, a junior administrator in your company  attempts to copy some entries from the /etc/inetd.conf file on a Solaris 8 OS server into the /etc/inetd.conf on a Solaris 10 OS server. The junior administrator is unable to determine why services do not start.  Which two commands can you run on the Solaris 10 OS server to start the services?()Ainetconv -fBinetcfg -i /etc/inetd.confCinetcfg -o /etc/inetd.confDinetconv -f -i /etc/inetd.confEinetconv -forceimport -o /etc/inetd.conf

单选题An administrator attempts to add a new 100GB logical volume to the datavg volume group, which resides on hdisk1.  How can the administrator easily determine if there is enough space in datavg to create the logical volume()Alslg datavgBlspv datavgClsvg datavgDlslv hdisk1

单选题What command should a system administrator run after using an editor to create the /etc/tunables/nextboot file?()Aksh -n nextbootBtunsave -a -f nextbootCtuncheck -r -f nextbootDdiff $(vmtune) /etc/tunables/nextboot

单选题You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()ACreate a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPOBCreate a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOCCreate a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPODCreate a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

单选题What system startup file would an administrator edit for starting up miscellaneous third party applications?()A/etc/rc.netB/etc/rc.bootC/etc/rc.localD/etc/rc.tcpip

单选题You are designing a strategy to address the requirements of the advertising department.  What should you do? ()A Create a GPO and link it to the Denver site.B Create a GPO and link it to the Advertising OU.C Create a GPO and link it to the graphicdesigninstitute.com domain.D Configure the Default Domain Policy to have the No Override option.E Use block inheritance to prevent the GPO from applying to members of the advertising department.