If file A has the capability of 724,the same group’s users of file A may doA. read A onlyB.write AC.execute AD.non-operation
If file A has the capability of 724,the same group’s users of file A may do
A. read A only
B.write A
C.execute A
D.non-operation
相关考题:
●If file A has the capability of 724,the same group's users of file A may do (74) .(74) A.read A onlyB.write AC.execute AD.non-operation
If file A has the capability of 724,the same group’s users of file A may doA.read A OnlyB.write AC.execute AD.non-operation
Your network contains an Active Directory domain. The domain contains a member server that runs Windows Server 2008 R2.You have a folder named Data that is located on the C drive. The folder has the default NTFS permissions configured.A support technician shares C:\Data by using the File Sharing Wizard and specifies the default settings.Users report that they cannot access the shared folder.You need to ensure that all domain users can access the share.What should you do?()A. Enable access-based enumeration (ABE) on the share.B. Assign the Read NTFS permission to the Domain Users group.C. From the Network and Sharing Center, enable public folder sharing.D. From the File Sharing Wizard, configure the Read permission level for the Domain Users group.
Given that the current directory is empty, and that the user has read and write privileges to the current, and the following:Which statement is true?() A.Compilation fails.B.Nothing is added to the file system.C.Only a new file is created on the file system.D.Only a new directory is created on the file system.E.Both a new file and a new directory are created on the file system.
Given that the current directory is empty, and that the user has read and write permissions, and the following:Which statement is true?() A.Compilation fails.B.The file system has a new empty directory named dir.C.The file system has a new empty directory named newDir.D.The file system has a directory named dir, containing a file f1.txt.E.The file system has a directory named newDir, containing a file f1.txt.
If file A has the capability of 724, the same group's users of file A may do(74).A.read A onlyB.write AC.execute AD.non-operation
Certkiller .com has asked you to create a file management application to monitor the hosts file.Certkiller .com has instructed you to change the hosts file if it has been changed.You, therefore, need to display the size and whether the hosts file is set to read-only.What should you do?()A.B.C.D.
You need to design an access control strategy that meets business and security requirements. Your solution must minimize forestwide replication. What should you do?()A、Create a global group for each department and a global group for each location. Add users to their respective departmental groups as members. Place the departmental global groups within the location global groups. Assign the location global groups to file and printer resources in their respective domains, and then assign permissions for the file and printer resources by using the location global groupsB、Create a global group for each department, and add the respective users as members. Create domain local groups for file and printer resources. Add the global groups to the respective domain local groups. Then, assign permissions to the file and printer resources by using the domain local groupsC、Create a local group on each server and add the authorized users as members. Assign appropriate permissions for the file and printer resources to the local groupsD、Create a universal group for each location, and add the respective users as members. Assign the universal groups to file and printer resources. Then, assign permissions by using the universal groups
You have a stand-alone computer that runs Windows XP Professional. Five users use the computer. Each user has a local user account. The user accounts are member of only the Users group. You need to share a document between all users of the computer. What should you do?() A、Copy the file to the Shared Documents folder. B、Copy the file to the My Documents folder of the local administrator. C、Copy the file to the %SystemRoot%/CSC folder. Add all user accounts to the guests group.D、Enable Offline File and Folder Caching. Copy the file to the %SystemRoot%/CSC folder.
A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()A、Set the group’s folder permissions to deny.B、Use Event Viewer to monitor changes to the file.C、Store a backup copy of the file on a USB drive.D、Change the file attribute to read only.
You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.()A、 The data file backup is done with multiple channelsB、 The data files is in the read-write mode after being backed up in the read only modeC、 The backup was taken after the data files was taken offline-normal or is in the read only modeD、 The data file backup complies with the back retention policy and the backup duplexing fe ture
Adam is working as a Database Administrator (DBA) for TeleSoft Corporation. His database is running in the ARCHIVELOG mode. During database startup, he discovers that one of the disks crashed, resulting in the permanent loss of a read-write USERS tablespace. The USERS01.dbf datafile belongs to the USERS tablespace and is 500 MB in size. He needs to recover the USERS tablespace from the backup. While reviewing the backup details, he discovers that the most recent available backup is five days old. This backup was taken when the USERS tablespace was read-only. After correcting the hardware problem that caused the failure, what should Adam do to recover the USERS tablespace?()A、 Restore the USERS01.dbf file from the backup, and open the database using the STARTUP command.B、 Restore the USERS01.dbf file using the RECOVER TABLESPACE command, and open the database using the ALTER DATABASE OPEN statement.C、 Restore the USERS01.dbf file from the backup, recover the USERS tablespace using the RECOVER TABLESPACE command, and open the database using the ALTER DATABASE OPEN statement.D、 Restore the USERS01.dbf file from the backup and change the status of the USERS tablespace from read-only to read-write using the ALTER TABLESPACE USERS READ WRITE statement. Then, recover the USERS tablespace using the RECOVER TABLESPACE command, and open the database using the ALTER DATABASE OPEN statement.
Examine these two statements:Which three are true about the MRKT tablespace?()A、The MRKT tablespace is created as a small file tablespace, because the file size is less than the minimum required for big file files.B、The MRKT tablespace may be dropped if it has no contents.C、Users who were using the old default tablespace will have their default tablespaces changed to the MRKT tablespace.D、No more data files can be added to the tablespace.E、The relative file number of the tablespace is not stored in rowids for the table rows that are stored in the MRKT tablespace.
You executed this command to create a password file: $ orapwd file = orapworcl entries = 10 ignorecase = N Which two statements are true about the password file?()A、It will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.B、It contains username and passwords of database users who are members of the OSOPER operating system group.C、It contains usernames and passwords of database users who are members of the OSDBA operating system group.D、It will permit the use of lowercase passwords for database users who have granted the SYSDBA role.E、It will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.
You issued the following command to mount the DATA disk group in restricted mode: ALTER DISKGROUP data MOUNT RESTRICT; What is the implication of this command?()A、 The client RDBMS instance can access the file as a read-only file.B、 A new disk cannot be added to a disk group.C、 A disk in a disk group can be taken offline.D、 The client RDBMS instance cannot access the files in the disk group.
Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. All servers run Windows Server 2003 Service Pack 2 (SP2). The network contains 10 file servers. Each file server hosts a share named Apps.On each file server, a local group named App-install-local has permissions to the Apps share. A global group named App-install-global belongs to the App-install-local group on each file server. App-install-global is used only to control permissions for the Apps share.You create a global group named Helpdesk.You need to provide the Helpdesk group access to the Apps share on each file server. The Helpdesk group must have the same permissions as the App-install-global group. You must achieve this goal by using the minimum amount of administrative effort.What should you do? ()A、Add the Helpdesk group to the App-install-global group.B、Add the Helpdesk group to the App-install-local group on each file server.C、Convert the App-install-global group to a universal group. Add the App-install-global group to the Helpdesk group.D、Convert the Helpdesk group to a universal group. Add the Helpdesk group to the App-install-local group on each file server.
You are the network administrator for Company.A user named Bruno has limited dexterity, which prevents him from using the standard keyboardcompleting his daily computing tasks. You configure his Windows 2000 Professional computer to use theon-screen keyboard and ToggleKeys option. You save the accessibility option settings to a floppy disk.You copy the .acw file to the desktop of another user named Peter. Peter’s domain user account is amember of the local Power Users group. Peter executes the .acw file. Peter informs you that theaccessibility options are not to his liking.You want to remove the accessibility options enabled by the .acw file on Peter’s computer.What should you do? ()A、Delete the .acw file from Peter’s desktop.B、Remove Peter’s account from the local Power Users group.C、Run the Accessibility wizard and select Restore Defaults.D、Use Task Manager to end the Explorer.exe process.
Your network contains a file server that runs Windows Server 2008 R2. The server has File Server Resource Manager (FSRM) installed.A file screen is created for a folder named Data. Data is located on the C drive. The file screen is configured to block files contained in the Audio and Video file group.You need to allow users in the sales department to upload video files to C:/Data/Sales. What should you do?()A、Create a file screen exception.B、Modify the Audio and Video file group.C、Implement an active file screen on C:/Data/Sales.D、Implement a passive file screen on C:/Data/Sales.
Your company has file servers located in an organizational unit named Payroll. The file servers contain payroll files located in a folder named Payroll. You create a GPO. You need to track which employees access the Payroll files on the file servers. What should you do()A、Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file servers, configure Auditing for the Everyone group in the Payroll folder.B、Enable the Audit object access option. Link the GPO to the domain. On the domain controllers, configure Auditing for the Authenticated Users group in the Payroll folder.C、Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit. On the file servers, configure Auditing for the Authenticated Users group in the Payroll folder.D、Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file servers, configure Auditing for the Everyone group in the Payroll folder.
Your network consists of a single Active Directory domain. The functional level of the domain isWindows Server 2003. All servers run Windows Server 2003 Service Pack 2 (SP2).The network contains 10 file servers. Each file server hosts a share named Apps. On each file server, a local group named App-install-local has permissions to the Apps share. A globalgroup named App-install-global belongs to the App-install-local group on each file server.App-install-global is used only to control permissions for the Apps share.You create a global group named Helpdesk.You need to provide the Helpdesk group access to the Apps share on each file server. The Helpdeskgroup must have the same permissions as the App-install-global group. You must achieve this goal byusing the minimum amount of administrative effort.What should you do? ()A、Add the Helpdesk group to the App-install-global group.B、Add the Helpdesk group to the App-install-local group on each file server.C、Convert the App-install-global group to a universal group. Add the App-install-global group to the Helpdesk group.D、Convert the Helpdesk group to a universal group. Add the Helpdesk group to the App-install-local group on each file server.
You are the desktop administrator for Contoso, Ltd. The company's network contains 1,000 Windows XP Professional computers, which are members of a single Active Directory domain. The computers' hard disks are formatted as NTFS. The company's software developers release a new custom application. The application uses a .dll file named AppLib.dll, which is installed in a folder named /Program Files/Contoso/OpsApp. The company's help desk technicians report that several users experience problems when they use the application because the AppLib.dll file was deleted on their client computers. The company's software developers recommend that you modify the file permissions on AppLib.dll so that users have only Read permission on the file. You need to ensure that all users have only Read permission on the AppLib.dll file on all 1,000 Windows XP Professional computers. What should you do?() A、Write a logon script that moves the AppLib.dll file into the %systemroot%/System32 folder.B、Ensure that Windows File Protection is enabled on all 1,000 Windows XP Professional computers.C、Apply the logon script to all domain user accounts. D、Use the Security Configuration and Analysis console to create a new security template that modifies the file permissions on AppLib.dll. E、Use Active Directory Group Policy to import and apply the template to all 1,000 Windows XP Professional computers. F、Repackage the custom application in a Windows Installer package.
You create a Microsoft ASP.NET Web application by using the Microsoft .NET Framework version 3.5. You use Windows Authentication for the application. You set up NTFS file system permissions for the Sales group to access a particular file. You discover that all the users are able to access the file. You need to ensure that only the Sales group users can access the file. What additional step should you perform?()A、Remove the rights from the ASP.NET user to the file. B、Remove the rights from the application pool identity to the file. C、Add the identity impersonate="true"/ section to the Web.config file. D、Add the authentication mode="[None]" section to the Web.config file.
Your network contains a file server named Server1 that runs Windows Server 2008 R2. Server1 has a volume named E.From the File Server Resource Manager console, you create a new quota for volume E. The quota is derived from the 100 MB limit quota template.You need to prevent users from storing audio and video files on volume E. What should you do?()A、Create a file screen.B、Create a file management task.C、Modify the properties of the quota.D、Modify the properties of the Audio and Video Files file group.
Your company plans to distribute an application to all of its client computers by using GroupPolicy. You save a file named setup.msi to a local folder on the domain controller. You assign the Authenticated Users group the Read and Read Execute permissions for the folder. You create a new Group Policy object (GPO) and a new Computer Configuration software installation package, and you point the package to the setup.msi file in the local folder. You link the GPO to an organizational unit (OU) that contains a computer object for a test client computer. When you log on to the test client computer, you notice that the application is not installed. You need to ensure that the application is installed on the test computer. What should you do?()A、 Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Log off the client computer and then log on.B、 Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Restart the client computer.C、 Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Log off the client computer and then log on.D、 Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Restart the client computer.
You need to recommend a deployment strategy for App1. What should you recommend?()A、Assign App1 to users by using a Group Policy.B、Publish App1 to users by using a Group Policy.C、Deploy App1 as a RemoteApp program by using an MSI file.D、Deploy App1 as a RemoteApp program by using an RDP file.
多选题You executed this command to create a password file: $ orapwd file = orapworcl entries = 10 ignorecase = N Which two statements are true about the password file?()AIt will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.BIt contains username and passwords of database users who are members of the OSOPER operating system group.CIt contains usernames and passwords of database users who are members of the OSDBA operating system group.DIt will permit the use of lowercase passwords for database users who have granted the SYSDBA role.EIt will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.
单选题Given that the current directory is empty, and that the user has read and write privileges to the current directory, and the following: Which statement is true?()A Compilation fails.B Nothing is added to the file system.C Only a new file is created on the file system.D Only a new directory is created on the file system.E Both a new file and a new directory are created on the file system.