单选题A user tries to ftp a 3 gigabyte file to an AIX machine at certain times during the day.  The file transfer fails at exactly 2,147,483,584 bytes each time.  All of the following are probable causes of the failures EXCEPT:()AAIX has not been updated to V4Bfsize in /etc/security/limits file has not been set to -1Cftp can only transfer files  2 gig in binary modeDThe filesystem is not large-file enabled

单选题
A user tries to ftp a 3 gigabyte file to an AIX machine at certain times during the day.  The file transfer fails at exactly 2,147,483,584 bytes each time.  All of the following are probable causes of the failures EXCEPT:()
A

AIX has not been updated to V4

B

fsize in /etc/security/limits file has not been set to -1

C

ftp can only transfer files > 2 gig in binary mode

D

The filesystem is not large-file enabled


参考解析

解析: 暂无解析

相关考题:

In your database, the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:Which authentication method would be used first?()A. authentication by password fileB. authentication by using certificates over SSLC. authentication by using the Oracle Internet DirectoryD. authentication by using the local OS of the database server

Files /tmp/file2 and /tmp/file3 are hard linked to /tmp/file1.What will the result be if a user makes changes to /tmp/file2 at the same time another user tries to delete /tmp/file1?() A.All three files will contain the updates and will remain available.B.All three files will be deleted and no changes will be made to /tmp/file2.C.Only /tmp/file2 will contain the updates, but /tmp/file3 will remain available.D.Both /tmp/file2 and /tmp/file3 will contain the updates and will remain available.

A user cannot ping any other hostnames from an AIX machine. The error received is "host name earth NOT FOUND". Which of the following files is most likely configured incorrectly?()A、/etc/resolv.confB、/etc/rc.tcpipC、/etc/aliasesD、/etc/hosts.equiv

A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()A、Request the user to logoff and log back on.B、Add the user as an administrator on their local machine.C、Add the user as an administrator on the server.D、Run an ipconfig /renew on the user’s machine.

What should an administrator do to set up a required role for a user id that will allow it to start/stop WPARs on the server?()A、On the desired WPAR:mkrole authorizations=aix.wpar.system newRole setkst -t role chuser roles=newRole default_roles=newRole user1B、On the global environment:mkrole authorizations=aix.wpar.system newRole setkst -t role chuser roles=newRole default_roles=newRole user1C、On the desired WPAR:Edit the /etc/security/authorizations file adding:‘newRole authorizations=aix.wpar.system’setkst -t role chuser roles=newRole default_roles=newRole user1D、On the global environment:Edit the /etc/security/authorizations file adding:‘newRole authorizations=aix.wpar.system’setkst -t role chuser roles=newRole default_roles=newRole user1

You have a computer that runs Windows XP Professional. Two users named User1 and User2 share the computer. User1 and User2 encrypt files on the computer. User1 encrypts a file named file1. doc. You need ensure that both User1 and User2 can view the contents of file1. doc. What should you instruct User1 to do?() A、Add the certificate of User2 to file1. doc. B、Assign User2 the Full Control NTFS permission on file1. doc. C、Copy file1. doc the %systemroot%/documents and settings/all users/ folder.D、Move file1. doc to the %systemroot%/documents and settings/all users/ folder.

Files /tmp/file2 and /tmp/file3 are hard linked to /tmp/file1. What will the result be if a user makes changes to /tmp/file2 at the same time another user tries to delete /tmp/file1?()A、All three files will contain the updates and will remain available.B、All three files will be deleted and no changes will be made to /tmp/file2.C、Only /tmp/file2 will contain the updates, but /tmp/file3 will remain available.D、Both /tmp/file2 and /tmp/file3 will contain the updates and will remain available.

A hospital customer with an experienced AIX and Microsoft Windows staff wants to consolidate all of their file/print services onto fewer systems.  They currently use multiple Microsoft Windows-based Intelsystems that are experiencing reliability problems.  They also have POWER4+ systems that are running multiple AIX LPARs that have experienced no reliability issues. They need at least 99.99% uptime. Which solution will meet their uptime needs at the lowest cost?()A、Combine the file/print servers onto a larger Intel-based machine (x445).B、Bring up a Linux LPAR on the pSeries and run Samba to provide file/print services.C、Bring up another AIX LPAR on the pSeries and run Samba to provide file/print services.D、Bring up another AIX LPAR on the pSeries and run Connect Direct to provide file/print services.

Which of the following NIS daemons must run on an AIX NIS client machine?()A、ypbindB、ypservC、ypwhichD、yppasswdd

A user tries to ftp a 3 gigabyte file to an AIX machine at certain times during the day.  The file transfer fails at exactly 2,147,483,584 bytes each time.  All of the following are probable causes of the failures EXCEPT:()A、AIX has not been updated to V4B、fsize in /etc/security/limits file has not been set to -1C、ftp can only transfer files  2 gig in binary modeD、The filesystem is not large-file enabled

Which of the following NIS daemons must run on an AIX machine configured as an NIS master?()A、ypbindB、ypservC、ypwhichD、yppasswdd

In your database,the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:$ SQLPLUS scott/tiger@DB01 AS SYSDBA   where DB01 is the net service name.   Which authentication method would be used first?()  A、 authentication by password fileB、 authentication by using certificates over SSLC、 authentication by using the Oracle Internet DirectoryD、 authentication by using the local OS of the database server

You are the desktop administrator for Contoso, Ltd. Philippe is a user in the accounting department. Philippe reports that he is not able to download a file from an FTP server by using Internet Explorer on his Windows XP Professional computer. When Philippe attempts to access the FTP server by using the URL ftp://ftp.contoso.com, Internet Explorer displays the following error message: "The password was rejected." Philippe informs you that he has a user name and password for the FTP server, but that Internet Explorer does not prompt him to type the user name or password. You need to ensure that Philippe can access the FTP server by using Internet Explorer on his computer. Which URL should you instruct Philippe to use?() A、ftp://ftp.contoso.com/Philippe B、ftp://Philippe:password@ftp.contoso.comC、ftp://Philippe/ftp.contoso.com D、ftp://ftp.contoso.com@Philippe:password

A system administrator has a mksysb on tape of an AIX 5.2 machine and needs to install it on a different server. How can this be accomplished?()A、Install the base AIX from 5.2 media and then install the mksysb overtop.B、Mount the tape and use the tar command to install AIX and the rest of the contents of the rootvg.C、Insert the mksysb tape and a 5.2 base media CD and then boot to maintenance mode and initiate the install.D、Install AIX 5.2 from base media and then perform an update_all install from the mksysb tape of the original machine.

单选题You are the desktop administrator for Contoso, Ltd. Philippe is a user in the accounting department. Philippe reports that he is not able to download a file from an FTP server by using Internet Explorer on his Windows XP Professional computer. When Philippe attempts to access the FTP server by using the URL ftp://ftp.contoso.com, Internet Explorer displays the following error message: "The password was rejected." Philippe informs you that he has a user name and password for the FTP server, but that Internet Explorer does not prompt him to type the user name or password. You need to ensure that Philippe can access the FTP server by using Internet Explorer on his computer. Which URL should you instruct Philippe to use?()Aftp://ftp.contoso.com/Philippe Bftp://Philippe:password@ftp.contoso.comCftp://Philippe/ftp.contoso.com Dftp://ftp.contoso.com@Philippe:password

单选题A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()ARequest the user to logoff and log back on.BAdd the user as an administrator on their local machine.CAdd the user as an administrator on the server.DRun an ipconfig /renew on the user’s machine.

单选题You want the user APP_DBA to administer the Oracle database from a remote machine. APP_DBA is granted the SYSDBA privilege to perform administrative tasks on the database. Which file is used by the Oracle database server to authenticate APP_DBA?()Acontrol fileBpassword fileClistener controller fileDcontrol file and password file

单选题You manage a computer running Windows 2000 Professional that belongs to a workgroup. You create a new user account (Tony) on that computer that is not a member of the Administrators group. You log on using the new account. You create a file with notepad in a folder that is on a volume formatted with NTFS. You encrypt the file. You give another user account defined on that computer, Luis the permission to take ownership of the file. Luis logs on using the account and takes ownership. However, she receives an error message reporting that access is denied when she tries to open the file. What can you do to allow Luis to open the file?()AInstruct Luis to decrypt the file before she tries to open it.BLog on with the account Tony and decrypt the file.CMove the file to a folder that is not encrypted on a different volume that is formatted with NTFS.DMove the file to a folder that is not encrypted on the same volume.

单选题A hospital customer with an experienced AIX and Microsoft Windows staff wants to consolidate all of their file/print services onto fewer systems.  They currently use multiple Microsoft Windows-based Intelsystems that are experiencing reliability problems.  They also have POWER4+ systems that are running multiple AIX LPARs that have experienced no reliability issues. They need at least 99.99% uptime. Which solution will meet their uptime needs at the lowest cost?()ACombine the file/print servers onto a larger Intel-based machine (x445).BBring up a Linux LPAR on the pSeries and run Samba to provide file/print services.CBring up another AIX LPAR on the pSeries and run Samba to provide file/print services.DBring up another AIX LPAR on the pSeries and run Connect Direct to provide file/print services.

单选题A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do so that the fully qualified hostname does not have to be typed every time the user wants to access ANY machine on mars.net?()AEdit the /etc/hosts file and add an alias to the correct entryBSet up an alias in his .kshrc file to alias the hostname to the fully qualified hostnameCAdd an alias to /etc/aliasesDAdd mars.net to the search path of the resolv.conf file

单选题A system administrator has a mksysb on tape of an AIX 5.2 machine and needs to install it on a different server. How can this be accomplished?()AInstall the base AIX from 5.2 media and then install the mksysb overtop.BMount the tape and use the tar command to install AIX and the rest of the contents of the rootvg.CInsert the mksysb tape and a 5.2 base media CD and then boot to maintenance mode and initiate the install.DInstall AIX 5.2 from base media and then perform an update_all install from the mksysb tape of the original machine.

单选题Which of the following AIX commands is used to produce an input file that is then used to generate a NIS map file?()AwdadmBmrgpwdCmakedbmDmkpasswd

单选题What should an administrator do to set up a required role for a user id that will allow it to start/stop WPARs on the server?()AOn the desired WPAR:mkrole authorizations=aix.wpar.system newRole setkst -t role chuser roles=newRole default_roles=newRole user1BOn the global environment:mkrole authorizations=aix.wpar.system newRole setkst -t role chuser roles=newRole default_roles=newRole user1COn the desired WPAR:Edit the /etc/security/authorizations file adding:‘newRole authorizations=aix.wpar.system’setkst -t role chuser roles=newRole default_roles=newRole user1DOn the global environment:Edit the /etc/security/authorizations file adding:‘newRole authorizations=aix.wpar.system’setkst -t role chuser roles=newRole default_roles=newRole user1

单选题You have a computer that runs Windows XP Professional. Two users named User1 and User2 share the computer. User1 and User2 encrypt files on the computer. User1 encrypts a file named file1. doc. You need ensure that both User1 and User2 can view the contents of file1. doc. What should you instruct User1 to do?()AAdd the certificate of User2 to file1. doc. BAssign User2 the Full Control NTFS permission on file1. doc. CCopy file1. doc the %systemroot%/documents and settings/all users/ folder.DMove file1. doc to the %systemroot%/documents and settings/all users/ folder.

单选题Files /tmp/file2 and /tmp/file3 are hard linked to /tmp/file1. What will the result be if a user makes changes to /tmp/file2 at the same time another user tries to delete /tmp/file1?()AAll three files will contain the updates and will remain available.BAll three files will be deleted and no changes will be made to /tmp/file2.COnly /tmp/file2 will contain the updates, but /tmp/file3 will remain available.DBoth /tmp/file2 and /tmp/file3 will contain the updates and will remain available.

单选题A user tries to ftp a 3 gigabyte file to an AIX machine at certain times during the day.  The file transfer fails at exactly 2,147,483,584 bytes each time.  All of the following are probable causes of the failures EXCEPT:()AAIX has not been updated to V4Bfsize in /etc/security/limits file has not been set to -1Cftp can only transfer files  2 gig in binary modeDThe filesystem is not large-file enabled

单选题A user cannot ping any other hostnames from an AIX machine. The error received is "host name earth NOT FOUND". Which of the following files is most likely configured incorrectly?()A/etc/resolv.confB/etc/rc.tcpipC/etc/aliasesD/etc/hosts.equiv

单选题You would like to configure your PC's IP address of 10.10.0.156 as an FTP host with a username of user and a password of mypass.Which configuration command accomplishes this goal?()Ahost user pc 10.10.0.156 ftp user mypassBhost user pc 10.10.0.156 tftp user mypassChost name user pc 10.10.0.156 ftp user mypassDhost name user pc 10.10.0.156 tftp user mypass