单选题An administrator learns that users are unable to login to a server via ssh. After making a telnet connection to the server, how can the administrator check the status of the sshd subsystem?()Alssys -a comBlssys -a sshdClssrc -s sshdDlssrc -s tcpip

单选题
An administrator learns that users are unable to login to a server via ssh. After making a telnet connection to the server, how can the administrator check the status of the sshd subsystem?()
A

lssys -a com

B

lssys -a sshd

C

lssrc -s sshd

D

lssrc -s tcpip


参考解析

解析: 暂无解析

相关考题:

You use—login-path to access a MySQL server on a Linux installation.Which statement is true about the – login-path option that is created by using mysql_config_editor?() A.All system users have access to the MySQL server via—login path localB.login-path can be used only for MySQL servers running on a local machineC.login-path allows you to provide login credentials without passing clear text passwords on the command lineD.When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later

Which two statements are true of login classes?() A. Users can be members of multiple login classes.B. Login classes define authorization parameters for a user.C. There are five system-defined login classes.D. Login class permission flags can be overridden for certain commands.

A user is unable to connect to the company‘s intranet server by FQDN, but can connect by IP address. Other users are not having a problem. An administrator verifies that the user can successfully ping the server by IP address and can properly resolve the FQDN using nslookup. The problem is persisting after running ipconfig /flushdns.Which of the following should the administrator do NEXT?()A. Examine the Imhost file.B. Flush the cache on the DNS server.C. Flush the cache on the WINS server.D. Examine the hosts file

What must an administrator do to prevent new telnet users from connecting to the system?() A.rmdev -l /dev/ptsB.touch /etc/nologinC.chdev -l sys0 -a nologinD.chuser -a login=false ALL

下列哪组中的用户能够共享文件夹()。A、Administrators,ServerOperators和PowerUsersB、Users和ServerOperatorsC、Users和PowerUsersD、Users和Administrator

A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()A、Logging detect fail-loginB、Login on-failure logC、Login detect login-failure logD、Logging login on-failureE、none of the above

Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()A、 Verify the configuration of the connected port on the network switch.B、 Reboot the server.C、 Install a new NIC on the server.D、 Verify that network cables are connected.

A user is unable to determine the default system texteditor. How can the local administrator assist the user by identifying the default text editor for the system?()A、Login as the user and run 'echo $ENV'.B、Login as root and run the 'env' command.C、Login as root and 'cat /etc/environment'.D、Login as the user and run the 'env' command.

A user is unable to determine the default system text editor. How can the local administrator assist the user by identifying the default text editor for the system?()A、Login as the user and run ’echo $ENV’.B、Login as root and run the ’env’ command.C、Login as root and ’cat /etc/environment’.D、Login as the user and run the ’env’ command.

Which two statements are true of login classes?()A、Users can be members of multiple login classes.B、Login classes define authorization parameters for a user.C、There are five system-defined login classes.D、Login class permission flags can be overridden for certain commands.

Several remote sales employees, who have come into the office this week, report that they are unable to get on the Internet, but no other users have reported similar issues.  The help desk hasescalated the issue and the case notes state that the users have IP addresses that begin with 169. Which of the following should the system administrator check FIRST?()A、DHCP serverB、Network switchesC、DNS serverD、Core router

An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.

An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()A、The administrator forgot to change the share permissionsB、The users were not part of the “Everyone” built in groupC、The administrator shared the files but not the folderD、“Modify” only allows users to change existing documents

An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue

Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram

A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A、Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B、Increase the number of licenses; using smit chaili censeC、Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D、Change User can logi field from false to true: using smit chuser.

A system administrator has been asked to lock a specific login account. Which of the following commands is used to accomplish this?()A、pwdckB、usrckC、chuserD、rmuser

What must an administrator do to prevent new telnet users from connecting to the system?()A、rmdev -l /dev/ptsB、touch /etc/nologinC、chdev -l sys0 -a nologinD、chuser -a login=false ALL

Maria has been set up as an assistant to the administrator. Users of your network are complaining that Maria has been opening their files and editing them. She needs to perform backups and installations of programs, and setting up of printers.   How do you fix the problem with the minimum amount of effort, yet allowing her to accomplish the assigned tasks? ()A、Remove her Administrator privilege and give her Power Users and Backup Operators.B、Leave her as Administrator and make deny on Users’ files.C、Remove her administrator privileges and assign her Server Operators.D、Remove her administrator privileges and assign her Power Users and Replicator. E、Tell her that she isn’t allowed to tamper with other users files.

多选题In the admin GUI, you navigate to "System" "Status" "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()ATo forcibly sign out a single user, you should select the check box next to that user's login name, then select Delete Session.BIf you select Delete All Sessions, all users are forcibly signed out and are unable to sign in again until Enable All Users is selected.CSelecting Disable All Users prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.DSelecting Refresh Roles re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.

单选题An administrator learns that users are unable to login to a server via ssh.  After making a telnet connection to the server, how can the administrator check the status of the sshd subsystem?()Alssys -a comBlssys -a sshdClssrc -s sshdDlssrc -s tcpip

单选题Certkiller.com has a server with Active Directory Rights Management Services (AD RMS) server installed. Users have computers with Windows Vista installed on them with an Active Directory domain installed at Windows Server 2003 functional level. As an administrator at Certkiller.com, you discover that the users are unable to benefit from AD RMS to protect their documents. You need to configure AD RMS to enable users to use it and protect their documents. What should you do to achieve this functionality()AConfigure an email account in Active Directory Domain Services (AD DS) for each user.BAdd and configure ADRMSADMIN account in local administrators group on the user computersCAdd and configure the ADRMSSRVC account in AD RMS server’s local administrator groupDReinstall the Active Directory domain on user computersEAll of the above

单选题An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()AThe administrator forgot to change the share permissionsBThe users were not part of the “Everyone” built in groupCThe administrator shared the files but not the folderD“Modify” only allows users to change existing documents

单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A Implement preventative measures.B Close the issue.C Document the outcome.D Question other users to make sure they are not having the same issue.

单选题A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()ALogging detect fail-loginBLogin on-failure logCLogin detect login-failure logDLogging login on-failureEnone of the above

单选题A user is unable to connect to the company's intranet server by FQDN, but can connect by IP address. Other users are not having a problem. An administrator verifies that the user can successfully ping the server by IP address and can properly resolve the FQDN using nslookup. The problem is persisting after running ipconfig /flushdns. Which of the following should the administrator do NEXT?()AExamine the Imhost file.BFlush the cache on the DNS server.CFlush the cache on the WINS server.DExamine the hosts file

单选题You have created a password file using the following command:   ORAPWD file=d:/oracle/ora9i/orapwU01 password=change_on_install entries=3   Which of the following is true about this password file?()A If the REMOTE_LOGIN_PASSWORDFILE parameter is set to SHARED in the initialization parameter file, then a maximum of three users can be granted the SYSDBA or SYSOPER privileges.B If the REMOTE_LOGIN_PASSWORDFILE parameter is set to EXCLUSIVE in the initialization parameter file, then a maximum of three users can be granted the SYSDBA or SYSOPER privileges.C If the REMOTE_LOGIN_PASSWORDFILE parameter is set to SHARED in the initialization parameter file, then the SYSDBA and SYSOPER privileges can be granted to other users as long as space in the password file isD If the REMOTE_LOGIN_PASSWORDFILE parameter is set to EXCLUSIVE in the initialization parameter file, then the SYSDBAand SYSOPER privileges can be granted to other users as long as space in the password file is available.

单选题Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()A Verify the configuration of the connected port on the network switch.B Reboot the server.C Install a new NIC on the server.D Verify that network cables are connected.