单选题A system administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this?()AusrckBsysckClssecDlsuser

单选题
A system administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this?()
A

usrck

B

sysck

C

lssec

D

lsuser


参考解析

解析: 暂无解析

相关考题:

An administrator needs to know the workstation name of a user who called in for support in orderto remotely manage it. After calling the user and having the user open a command prompt, whichof the following commands would the administrator ask the user to type?()A. NetstatB. IfconfigC. HostnameD. Ping

A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A、system /vB、winnt /sC、sfc /scannowD、chkdsk /f

While logged into the console, a system administrator would like to change the server’s primary IP address from X.X.X.X to Y.Y.Y.Y. What would be the best way to perform this task?()A、Use smit chinetB、Use smit mktcpipC、Issue ifconfig -a Y.Y.Y.YD、Edit the /etc/hosts file with the new IP information

How can you verify that you have correctly configured SSH access to your Junos device?()A、user@router# show system servicesB、user@router show configuration servicesC、user@router# show configuration system servicesD、user@router# show system login

An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()A、odmgetB、odmaddC、odmshowD、odmcreate

An administrator needs to know the workstation name of a user who called in for support in orderto remotely manage it. After calling the user and having the user open a command prompt, whichof the following commands would the administrator ask the user to type?()A、NetstatB、IfconfigC、HostnameD、Ping

A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A、 That there are no DHCP relay serversB、 That the user account on Active Directory is not lockedC、 That the network card driver is not installed incorrectlyD、 The network connection is functioning

Which of the following commands would be used to verify the integrity of critical system files?()A、verifyB、nslookupC、sfcD、chkdsk

An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue

Which of the following is the LAST step an administrator should take when troubleshooting an issue?()A、 Identify changes to the system.B、 Replicate the problem in the system.C、 Verify full system functionality. D、 Implement the solution.

A system administrator completed an upgrade of the maintenance level of their AIX system. Which of the following commands should be run to verify that the operating system is in a consistent state?()A、instfix -iB、lslpp -lC、lppchk -vD、oslevel -r

An administrator is installing a C compiler on a system. According to the compiler’s documentation, the AIX fileset bos.adt.libm must be installed prior to the installation of the compiler.  Which of the following commands would verify installation of the prerequisite fileset()A、installpB、instfixC、IppchkD、Islpp

The administrator would like to verify that hdisk2 has the correct reserve policy set.  What IOS command should the administrator run?()A、 lspv -pv hdisk2B、 lsattr -El hdisk2C、 lsdev -dev hdisk2 -attrD、 lspath -dev hdisk2 -attr

A system administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this?()A、usrckB、sysckC、lssecD、lsuser

Which command can a system administrator use to verify that a tape is in backup format and is readable by the system?()A、tarB、tctlC、tcopyD、restore

A system administrator has just finished upgrading a system to AIX 5.2. If there are future problems, the system administrator would like to add an entry to the AIX errorlog to record this event. Which of the following commands can be issued for this purpose?()A、/usr/bin/errmsg "System upgraded to AIX 5.2"B、/usr/bin/errlog "System upgraded to AIX 5.2"C、/usr/bin/errupdate "System upgraded to AIX 5.2"D、/usr/bin/errlogger "System upgraded to AIX 5.2"

How does a system administrator add a new user to a system?()A、mkuserB、cruserC、adduserD、edit /etc/password

A system administrator would like to set a system to reboot after a crash.  What is the best way to do this?()A、 smit chgsysB、 bosbootC、 smit dumpD、 bootlist -r

A system without a monitor has crashed. The administrator would like to see the console output to determine a possible cause of the crash and ensure that there were no problems on reboot. Which command would be used?()A、alogB、swconsC、lsconsD、syslog

A system administrator is installing a C compiler on a system. According to the compiler’s documenation, the AIX fileset bos.adt.lib must be installed prior to installation of the compiler. Which command would the system administrator use to verify installation of the bos.adt.lib fileset?()A、installpB、instfixC、lsallqD、lslpp

A System p administrator would like to verify the user definitions in the /etc/passwd file.  Which of the following commands will accomplish this()A、sysckB、usrckC、lssecD、lsuser

A system administrator would like to modify the system default user characteristics so that each new user will now be assigned (by default) the csh shell rather than the ksh shell. Which of the following actions should be performed?()A、Run the command chlogin -shell "csh"B、Run the command mkuser -default "SHELL=csh"C、Edit /etc/passwd and change all "ksh" entries to "csh"D、Modify the contents of /usr/lib/security/mkuser.default file

单选题A system administrator would like to set a system to reboot after a crash.  What is the best way to do this?()A smit chgsysB bosbootC smit dumpD bootlist -r

单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()Asystem /vBwinnt /sCsfc /scannowDchkdsk /f

单选题The administrator would like to verify that hdisk2 has the correct reserve policy set.  What IOS command should the administrator run?()A lspv -pv hdisk2B lsattr -El hdisk2C lsdev -dev hdisk2 -attrD lspath -dev hdisk2 -attr

单选题An administrator is beginning a set of failover tests. The administrator would like to have clean log files foreach test. Which command will achieve this?()AclcycleBclrefreshCcllogcycleDcllogrotate

单选题A system administrator has just finished upgrading a system to AIX 5.2. If there are future problems, the system administrator would like to add an entry to the AIX errorlog to record this event. Which of the following commands can be issued for this purpose?()A/usr/bin/errmsg System upgraded to AIX 5.2B/usr/bin/errlog System upgraded to AIX 5.2C/usr/bin/errupdate System upgraded to AIX 5.2D/usr/bin/errlogger System upgraded to AIX 5.2

单选题Which of the following is the LAST step an administrator should take when troubleshooting an issue?()A Identify changes to the system.B Replicate the problem in the system.C Verify full system functionality. D Implement the solution.