单选题Which procedure should be used to configure the system to prevent all users from using the ’at’ command()?ACreate a /var/adm/cron/at.allow file with no entriesBCreate a /var/adm/cron/at.deny file with ’*’ as the only entryCCreate a /var/adm/at/at.deny file with ’ALL’ as the only entryDCreate a /var/adm/at/at.allow file with ’NONE’ as the only entry

单选题
Which procedure should be used to configure the system to prevent all users from using the ’at’ command()?
A

Create a /var/adm/cron/at.allow file with no entries

B

Create a /var/adm/cron/at.deny file with ’*’ as the only entry

C

Create a /var/adm/at/at.deny file with ’ALL’ as the only entry

D

Create a /var/adm/at/at.allow file with ’NONE’ as the only entry


参考解析

解析: 暂无解析

相关考题:

Which smit fastpath should be used to configure Link Aggregation on a server?() A.tcpipB.linkAggC.failoverD.etherchannel

Which of the following tools can be used to configure the IBM System Storage DS8000? () A. IBM Systems DirectorB. Unisphere Management SuiteC. IBM System Storage Productivity Center (SSPC)D. IBM Standalone Solutions Configuration Tool (SSCT)

Which of the following is TRUE about the ate program?()A、When running ate for the first time it will prompt for all the required information and configure all the required devicesB、The program is used by cu to communicate to a remote systemC、The program is used for remote communications between the host and a remote system using a modem or null modem via a tty portD、The program ate calls cu to communicate with the remote system

Which of the following commands should be used to view and change the network filesystem tuning parameters available on the system?()A、 noB、 nfsoC、 vmtuneD、 exportfs

You need to ensure that the stored procedure that inserts new loan requests can access data in tables that are stored in another database on the same SQL Server instance. Which two actions should you perform?()A、Ensure that the stored procedure and the tables are owned by users that are associated with the same SQL Server login.B、Ensure that the stored procedure and the tables are owned by the same database user.C、Ensure that the stored procedure and the tables use the same database schema.D、Configure the multiuser database option on both databases.E、Configure the cross-database ownership chaining option on both databases.

A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()A、Upgrade the operating system to Windows XP Home.B、Have the customer convert to NTFS and enable data encryption.C、Tell the customer that a laptop should not be used for classified data.D、Configure the wireless adapter to only connect to secure networks.

Which of the following commands should be used to observe the number of system calls per second? ()A、 sar B、 iostat C、 svmon D、 vmstat

A system administrator has been asked to install an APAR but wants to be able to easily remove it. Which install option should be used?()A、applyB、cleanupC、commitD、reject

Which smit fastpath should be used to configure Link Aggregation on a server?()A、tcpipB、linkAggC、failoverD、etherchannel

Which of the following WLM commands should be used to monitor performance on a system running wlm?()A、 wlmcntrlB、 wlmstatC、 wlmcheckD、 wlmassign

After the LED display is flashing 888 and the system is rebooted, which of the following commands should be used to gather dump information?()A、snap B、errpt C、kdb D、trace

A system administrator needs to configure dump devices for the system. Which command would be used to estimate the size required for a dump device?()A、lsdevB、chdevC、sysdumpdevD、sysdumpstart

Which procedure should be used to configure the system to prevent all users from using the ’at’ command()?  A、Create a /var/adm/cron/at.allow file with no entriesB、Create a /var/adm/cron/at.deny file with ’*’ as the only entryC、Create a /var/adm/at/at.deny file with ’ALL’ as the only entryD、Create a /var/adm/at/at.allow file with ’NONE’ as the only entry

Which of the following commands should be used to determine which disk of a system is experiencing a disk I/O performance problem?()A、 filemonB、 istatC、 vmstatD、 iostat

Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig

Which of the following commands should be used to display a system routing table?()A、 route B、 netstat C、 iptrace D、 traceroute

单选题Which of the following commands should be used to determine which disk of a system is experiencing a disk I/O performance problem?()A filemonB istatC vmstatD iostat

单选题You work as an application developer at CER-Tech.com. Cert-Tech.com uses Visual studio.NET 2005 as its Application Development platform.You are developing a .NET Framework 2.0 application used to store a type-safe list of names and e-mail addresses. The list will be populated all at ones from the sorted data which means you will not always need to perform insertion or deletion operations on the data. You are required to choose a data structure that optimizes memory use and has good performance.What should you do?()A The System.Collections.Generic.SortedList class should be used B The System.Collections.HashTable class should be usedC The System.Collections.Generic.SortedDictionary class should be used D The System.Collections.SortedList class should be used

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a report which is often executed during business time. There is a stored procedure that is used as the data source for the report. You get a report from users saying that they receive the data returned by the report but the data is inconsistent. As the technical support, you check and find that phantom reads cause this problem. You must make sure that consistent data is returned by the report while not affecting other users. So what action should you perform to achieve this goal?()AYou should configure the database for Read Committed Snapshot isolation. BYou should modify the stored procedure to use the Snapshot isolation level CYou should configure the database for Auto Update Statistics asynchronously DYou should modify the stored procedure to use the Repeatable Read isolation level

单选题Which of the following commands should be used to report statistics on network protocols used by the system?()A lsattrB pstatC netstatD ifconfig

单选题Which of the following tools can be used to configure the IBM System Storage DS8000? ()AIBM Systems DirectorBUnisphere Management SuiteCIBM System Storage Productivity Center (SSPC)DIBM Standalone Solutions Configuration Tool (SSCT)

多选题While troubleshooting a video problem on an application server, the system administrator has determined that the video firmware should be updated. Which of the following sources should be used to locate an appropriate update for this hardware?()AThird-party manufacturerBVideo chipset manufacturerCServer manufacturerDOperating system manufacturerEShareware file sharing site

单选题Which of the following commands should be used to view and change the network filesystem tuning parameters available on the system?()A noB nfsoC vmtuneD exportfs

单选题Which of the following commands should be used to display a system routing table?()A route B netstat C iptrace D traceroute

单选题You have abandoned ship in tropical waters. Which procedure(s) should be used during a prolonged period in a raft?().AWet clothes during the day to decrease perspirationBGet plenty of restCKeep the entrance curtains openDAll of the above