Which command will configure a directory /commonfiles so that a user cannot delete files owned by other users in the same group?()A、chmod +S /commonfilesB、chmod 4775 /commonfilesC、chmod 1777 /commonfilesD、chmod -orgx /commonfiles

Which command will configure a directory /commonfiles so that a user cannot delete files owned by other users in the same group?()

  • A、chmod +S /commonfiles
  • B、chmod 4775 /commonfiles
  • C、chmod 1777 /commonfiles
  • D、chmod -orgx /commonfiles

相关考题:

The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?() A. The default administrative distance is used.B. The command is used to establish a static route.C. The command is used to configure the router interfaces.D. The command is used to establish a stub network.E. The subnet mask for the source address is 255.255.255.0

What are the basic configuration steps to enable IS - IS?()A、Configure the net system - id command under routerisis and enable IS - IS on each interface with the ip router isis command.B、Configure the net sy stem - id and the network net - id commands under routerisis.C、Configure the network net - id command(s) under routerisis and enable IS - IS on each interface with the ip router isis command.D、Configure the network net - id command(s) and the is - type level -1- 2 command under routerisis.E、Configure the net system - id and the network net - id commands under routerisis and enable ISIS on each interface with the ip router isis command.

The following configuration command was issued on router TK1:ip route 172.16.3.0 255.255.255.0 192.168.2.1.Which of the following statements are true regarding this command?()A、The command is used to establish a static route.B、The default administrative distance is used.C、The command is used to configure the default route.D、The subnet mask for the source address is 255.255.255.0E、The command is used to establish a stub network

Which configuration command dynamically detects and configures a Bridged 1483 interface?()A、auto-configure ipB、auto-configure pppC、auto-configure pppoeD、auto-configure bridgedethernet

Which two of these steps are minimum requirements to configure OSPFv3 under IPv6?()A、Configure a routing process using the command ipv6 router ospf [process-id].B、Add the network statement for the interfaces on which OSPF will run.C、Configure OSPF on the interface that it will run on.D、Use the passive-interface command on the interfaces on which OSPF should not run.E、Enable routing.

Which command would you configure globally on a Cisco router that would allow you to view directly connected Cisco devices?()A、enable cdpB、cdp enableC、cdp runD、run cdp

Which statement correctly describes IPsec VPN backup technology?()A、The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocolB、Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworksC、Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP addressD、The cypto isakmp keepalive command is used to configure stateless failover

Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()A、Configure a dynamic routing protocol.B、Configure SVI interfaces with IP addresses and subnet masks.C、Configure switch ports with network addresses.D、Configure switch ports with the autostate exclude command.E、Document the MAC addresses of the switch ports.

The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?()A、The default administrative distance is used.B、The command is used to establish a static route.C、The command is used to configure the router interfaces.D、The command is used to establish a stub network.E、The subnet mask for the source address is 255.255.255.0

Which command is used to initialize and configure a NIM master?()A、/usr/sbin/nim_initB、/usr/bin/installnimC、/usr/sbin/nimconfigD、/usr/sbin/setup_server

A system administrator needs to configure dump devices for the system. Which command would be used to estimate the size required for a dump device?()A、lsdevB、chdevC、sysdumpdevD、sysdumpstart

Which command is used to configure RMAN to perform a compressed backup for every backup executed?()A、 BACKUP AS COMPRESSED BACKUPSET DATABASEB、 BACKUP AS COMPRESSED COPY OF DATABASEC、 CONFIGURE DEVICE TYPE DISK BACKUP TYPE TO COMPRESSED BACKUPSETD、 CONFIGURE DEVICE TYPE DISK BACKUP TYPE COMPRESS E、 BACKUP DATABASE COMPRESS

When CONFIGURE CONTROLFILE AUTOBACKUP is set to ON, RMAN automatically performs a control file autobackup in which three situations?()A、At the end of every RUN block. B、After every SET CONTROLFILE AUTOBACKUP FORMAT command. C、After every BACKUP or COPY command issued at the RMAN prompt. D、At the end of every RUN block if the last command in the block was either BACKUP or COPY. E、Whenever a BACKUP or COPY command within a RUN block is followed by a command that is neither BACKUP nor COPY. F、After every BACKUP or COPY command within a RUN block that is followed by the CONFIGURE CONTROLFILE AUTOBACKUP FORMAT command.

You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()A、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;B、 CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;C、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;D、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;

多选题When CONFIGURE CONTROLFILE AUTOBACKUP is set to ON, RMAN automatically performs a control file autobackup in which three situations?()AAt the end of every RUN block.BAfter every SET CONTROLFILE AUTOBACKUP FORMAT command.CAfter every BACKUP or COPY command issued at the RMAN prompt.DAt the end of every RUN block if the last command in the block was either BACKUP or COPY.EWhenever a BACKUP or COPY command within a RUN block is followed by a command that is neither BACKUP nor COPY.FAfter every BACKUP or COPY command within a RUN block that is followed by the CONFIGURE CONTROLFILE AUTOBACKUP FORMAT command.

单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()AThe command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabledBBackup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upCBackup optimization is permanently disabledDBackup optimization is temporarily disabled because a redundancy-based retention policy is specified

单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy:   CONFIGURE RETENTION POLICY TO REDUNDANCY 3;   Which statement is true?()A The command fails because you cannot configure a redundancy-based retention policy when backup  optimization is enabledB Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upC Backup optimization is permanently disabledD Backup optimization is temporarily disabled because a redundancy-based retention policy is specified

单选题Which configuration command dynamically detects and configures a PPPoA interface?()Aauto-configure ipBauto-configure pppCauto-configure pppoeDauto-configure bridgedethernet

单选题You enter configuration mode with the configure command. You need to abort the changes that you have made and start again with a fresh copy of the active configuration. Which command should you use?()Arollback 0Bload activeCreset configDclear candidate config

单选题Which dose the frame-relay interface-dlinterface-dlcci command configure?()Aremote DLCI on the main interfaceBlocal DLCI on the main interfaceClocal DLCI on the subinterfaceDremote DLCI on the subinterface

单选题Which command is used to initialize and configure a NIM master?()A/usr/sbin/nim_initB/usr/bin/installnimC/usr/sbin/nimconfigD/usr/sbin/setup_server

多选题The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?()AThe default administrative distance is used.BThe command is used to establish a static route.CThe command is used to configure the router interfaces.DThe command is used to establish a stub network.EThe subnet mask for the source address is 255.255.255.0

多选题Which two of these steps are minimum requirements to configure OSPFv3 under IPv6?()AConfigure a routing process using the command ipv6 router ospf [process-id].BAdd the network statement for the interfaces on which OSPF will run.CConfigure OSPF on the interface that it will run on.DUse the passive-interface command on the interfaces on which OSPF should not run.EEnable routing.

多选题The following configuration command was issued on router TK1:ip route 172.16.3.0 255.255.255.0 192.168.2.1.Which of the following statements are true regarding this command?()AThe command is used to establish a static route.BThe default administrative distance is used.CThe command is used to configure the default route.DThe subnet mask for the source address is 255.255.255.0EThe command is used to establish a stub network

单选题Which command is used to configure RMAN to perform a compressed backup for every backup executed?()A BACKUP AS COMPRESSED BACKUPSET DATABASEB BACKUP AS COMPRESSED COPY OF DATABASEC CONFIGURE DEVICE TYPE DISK BACKUP TYPE TO COMPRESSED BACKUPSETD CONFIGURE DEVICE TYPE DISK BACKUP TYPE COMPRESS E BACKUP DATABASE COMPRESS

单选题Which statement correctly describes IPsec VPN backup technology?()AThe cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocolBReverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworksCEach Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP addressDThe cypto isakmp keepalive command is used to configure stateless failover