What does the Filesystem Hierarchy Standard enable? ()A、 software to predict the location of installed files and directoriesB、 software to predict the ownership and access rights to files and directoriesC、 users to predict the location of installed files and directoriesD、 users to predict how the filesystem should be formatted according to need
What does the Filesystem Hierarchy Standard enable? ()
- A、 software to predict the location of installed files and directories
- B、 software to predict the ownership and access rights to files and directories
- C、 users to predict the location of installed files and directories
- D、 users to predict how the filesystem should be formatted according to need
相关考题:
What is the default local location for syslog and trace files?() A./logB./home/logC./var/logD./etc/log
Which two installations must be completed to allow third-party software to interact with the Cisco Unified CallManager Express system through TAPI Lite?()A、the files in the Cisco IOS TSP file on all Windows PCs on the LAN B、both the Cisco IOS TSP and TAPI Lite files on all Windows PCs on the LAN C、the Cisco TAPI Lite files on the same Windows PC where the software is installed D、the files in the Cisco IOS TSP file on the same Windows PC where the software is installed E、the Cisco IOS TSP on the same Windows PC where the software is installed and on all remote teleworker PCs
Which of the following is the default location for user account files in Windows Vista?()A、C:/windows/System32B、C:/users/publicC、C:/usersD、C:/documents and settings
You decided to change the location of the flash recovery area. You executed the following command: Which statement is true?()A、The location can be changed only if the flash recovery area is empty.B、After executing the command, all new flash recovery area files will be created in the new location.C、The command will generate an error because you cannot change the flash recovery area while the database is open.D、All the existing files in the flash recovery area will be moved to the new location, and all new Flash Recovery Area files will be created in the new location.
You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal?() (Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.
You configure the hard disk on each computer to have two 4-GB partitions. Windows NT Workstation is installed on driver C. Windows 2000 Professional is installed on drive D. In Windows 2000 Professional, you configure a disk quota on drive D to prevent users from saving work files on the disk. You restart the computers and load Windows NT Workstation. You notice that users can still save files to drive D. You want t prevent users from saving files to drive D in either operating system. You also want to ensure that users can access both drives while using either operating system. What should you do on each computer?()A、Use Windows 2000 Professional to configure drive D as a dynamic partitionB、Use Windows 2000 Professional to enable Encrypting File System (EFS) on drive DC、Use Windows NT Workstation to configure NTFS permissions on drive D to deny the users write permissionD、Reinstall Windows NT Workstation after configuring the disk quotas
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a member server named Server1. Server1 has the File Server server role installed. On Server1, you create a share named Documents. The Documents share will contain the files and folders of all users. You need to ensure that when the users connect to Documents, they only see the files to which they have access. What should you do?()A、Modify the NTFS permissionsB、Modify the Share permissionsC、Enable access-based enumerationD、Configure Dynamic Access Control
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All user files are stored in home folders on a member server named Testking3. Full backups are performed on Testking3 every day. A user named Mark leaves the company. A technical support specialist deletes Mark's user account and his files. You need to restore certain files from Mark's folder and enable another user named Anne to access them. What should you do?()A、Clear the Restore security check box. Use the Backup utility to restore Mark's files to the original location.B、Select the Restore security check box. Use the Backup utility to restore Mark's files to the original location.C、Clear the Restore security check box. Use the Backup utility to restore Mark's files to Anne's home folder.D、Select the Restore security check box. Use the Backup utility to restore Mark's files to Anne's home folder.
During a printer driver installation, a message appears stating “The software being installed for this hardware has not passed Windows logo testing”. Which of the following is the SAFEST course of action for the administrator to take?()A、Continue with installationB、Install .dll files needed for the printerC、Obtain a Microsoft certified driverD、Restart the printer and try again
What is the default local location for syslog and trace files?()A、/logB、/home/logC、/var/logD、/etc/log
A user reports that they are unable to open any audio files. Yesterday, the user uninstalled third party music software. Which of the following is the MOST likely cause of the user’s error?()A、The file associations were not returned after the software was uninstalled.B、The user is not opening the files correctly.C、The uninstalled software has corrupted all the audio files on the computer.D、The sound card is not properly configured.
After moving files from one folder to another, the technician cannot access them. Which of the following MUST the technician do to regain access to these files?()A、In folder options, select show hidden files and folders.B、Perform the transfer again.C、Reboot the system; access will be reset automatically.D、Take ownership of the files.
In your Certkiller .com production database, you find that the database users are able to create and read files with unstructured data, available in any location on the host machine from an application. You want to restrict the database users to access files in a specific location on the host machine. What could do to achieve this?()A、Modify the value for the UTL_FILE_DIR parameter in the parameter fileB、Grant read and write privilege on the operating system path to the database usersC、Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter fileD、Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter fileE、Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users
You work as a database administrator for Supportcenter.cn. In your Oracle database 10g installation you have set ORACLE_BASE to /u01/app/oracle. Which objective will be achieved by this setting?()A、The Oracle kernel will be placed in this location.B、The Oracle software will be placed in this location.C、The server parameter file (SPFILE) will be placed in this location.D、The database files will be placed in this location, if not specified explicitly.E、The location will be considered for the base of Oracle Managed Files (OMF).F、The location will be considered for the base of Optimal Flexible Architecture (OFA).
You enabled the flashback logging feature, but you have not specified the location of the flash recovery area. Which location would be used as the default location for the flash recovery area?()A、 The location used for control files.B、 The location used for redo log files.C、 The location set by using $ORACLE_BASED、 The location set by using $ORACLE_HOMEE、 The location set by using CORE_DUMP_DESTF、 The location set by using BACKGROUND_DUMP_DEST
Which three statements are true about the stages of database startup?()A、Data files and redo log files can be renamed at the MOUNT stage.B、Control files are read at the OPEN stage for the location of data files.C、Control files are required to bring the database to the NOMOUNT stage.D、Data files and redo log files are made available to users at the OPEN stage.E、Data files and online redo log files are checked for consistency while opening the database
You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.
Your network consists of a single Active Directory domain. All network servers run Windows Server 2003 Service Pack 2 (SP2). You need to use Windows Backup to restore files to a shared folder located on a file server. The restore must maintain all the file versions saved by users since the last backup. What should you do?()A、Restore the files to their original location and select the Replace existing files option.B、Restore the files to their original location and select the Replace existing files if they are older than the backup files option.C、Restore the files to an alternate location. Copy the files to the shared folder and choose to overwrite the files with duplicate file names.D、Restore the files to an alternate location. Copy the files to the shared folder and choose not to overwrite thefiles with duplicate file names.
You are the administrator of your company’s network. The software department is preparing to rewrite an accounting application so that it will run on Windows 2000 Professional computers. All of the computers in the software department currently use Windows 98. You want to configure the computers in the software department so that the users can use both Windows 98 and Windows 2000 Professional during the project. You also want to ensure that the computers are configured for optimal disk performance. In addition you want to ensure that users in the software department can access all of the files on their computers by using either operating system. What should you do? ()A、 Create and format a FAT 32 partition.B、 Create and format an NTFS volume.C、 Configure Windows 2000 Professional to enable disk compression.D、 Configure Windows 2000 Professional to enable dynamic volume
Kevin, the Software Developer of Perfect Solution Inc., recently left his job. The company's Administrator moves all of his home folder files to his Manager's home folder. The NTFS partition that contains the home folders has the Encrypting File System (EFS) enabled. When the Manager attempts to open Kevin's files, he is denied access. What should be done, so that the Manager can access those files with least administrative burden? ()A、Grant the Manager NTFS Full Control permission to the files.B、Grant the Manager the NTFS Take Ownership permission to the files.C、Logon to the network as a Recovery Agent. Decrypt the files for the Manager.D、Logon to the network as a member of Backup Operators group. Decrypt the files for the Manager.
多选题Which two installations must be completed to allow third-party software to interact with the Cisco Unified CallManager Express system through TAPI Lite?()Athe files in the Cisco IOS TSP file on all Windows PCs on the LANBboth the Cisco IOS TSP and TAPI Lite files on all Windows PCs on the LANCthe Cisco TAPI Lite files on the same Windows PC where the software is installedDthe files in the Cisco IOS TSP file on the same Windows PC where the software is installedEthe Cisco IOS TSP on the same Windows PC where the software is installed and on all remote teleworker PCs
单选题You enabled the flashback logging feature, but you have not specified the location of the flash recovery area. Which location would be used as the default location for the flash recovery area?()A The location used for control files.B The location used for redo log files.C The location set by using $ORACLE_BASED The location set by using $ORACLE_HOMEE The location set by using CORE_DUMP_DESTF The location set by using BACKGROUND_DUMP_DEST
单选题After moving files from one folder to another, the technician cannot access them. Which of the following MUST the technician do to regain access to these files?()AIn folder options, select show hidden files and folders.BPerform the transfer again.CReboot the system; access will be reset automatically.DTake ownership of the files.
单选题What is the default local location for syslog and trace files?()A/logB/home/logC/var/logD/etc/log
单选题You work as a database administrator for Supportcenter.cn. In your Oracle database 10g installation you have set ORACLE_BASE to /u01/app/oracle. Which objective will be achieved by this setting?()AThe Oracle kernel will be placed in this location.BThe Oracle software will be placed in this location.CThe server parameter file (SPFILE) will be placed in this location.DThe database files will be placed in this location, if not specified explicitly.EThe location will be considered for the base of Oracle Managed Files (OMF).FThe location will be considered for the base of Optimal Flexible Architecture (OFA).
多选题You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)AEnable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.BUse IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.CUse Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.DDisable all LM and NTLM authentication methods on TestKing1.EUse IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.
多选题What does the Filesystem Hierarchy Standard enable? ()Asoftware to predict the location of installed files and directoriesBsoftware to predict the ownership and access rights to files and directoriesCusers to predict the location of installed files and directoriesDusers to predict how the filesystem should be formatted according to need