单选题Which files can be used together to allow remote command execution on a server?()A/etc/.rhosts and $HOME/hosts.equivB/etc/hosts.equiv and $HOME/.rhostsC/etc/rhosts.equiv and $HOST/.rhostsD/etc/hosts.equiv and $HOME/.hosts.equiv

单选题
Which files can be used together to allow remote command execution on a server?()
A

/etc/.rhosts and $HOME/hosts.equiv

B

/etc/hosts.equiv and $HOME/.rhosts

C

/etc/rhosts.equiv and $HOST/.rhosts

D

/etc/hosts.equiv and $HOME/.hosts.equiv


参考解析

解析: 暂无解析

相关考题:

Which command is used on the local router to invoke a loopback mode on a remote ERX Edge Router?() A.AB.BC.CD.D

A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?() A.EDITB.CHMODC.ATTRIBD.CONVERT

The man page for command shows the following syntax: The man page for command shows the following syntax: command [ -a | -b ] Which of the following statements is true regarding this entry?() A. Either the -a or flag -b may be used, but not both.B. If the flag -a is used then the flag -b also must be used.C. One of the -a or -b flags must be used, but not both at the same time.D. Both the flags may be used together, but neither are mandatory.

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?() A. reflexiveB. extendedC. standardD. dynamic

Which of the following can be used to manage a servers BIOS remotely? ()A、 Remote desktop softwareB、 Dedicated management cardC、 Telnet sessionD、 IP KVME、 VPN

Which of the following technologies can be used to remotely gain access to a server console?()A、PS/2 KVMB、LDAPC、VNCD、Remote desktopE、VPN

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()A、reflexiveB、extendedC、standardD、dynamic

A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A、EDITB、CHMODC、ATTRIBD、CONVERT

After a virus outbreak, which of the following can be used to deploy a hotfix in a Microsoft environment? ()A、WSUSB、Terminal servicesC、Remote management cardsD、Group policyE、SNMP

Which of the following tools can be used to securely connect to a remote system?()A、RCMDB、SSHC、TELNETD、HTTP

When executing the massload command to load catalog data into a WebSphere Commerce database on a remote DB2 server,which of the following can be used as valid values for the -method command line parameter?()A、createB、importC、loadD、sqlimportE、update

The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()A、The local and the remote host must have Transmission Control Protocol/Internet Protocol (TCP/IP) installed and configured. B、The remote host must support NFS. C、The remote host must have an NFS exported directory defined such that the local host has read and write permissions to the dump file on the remote host. D、The remote host can be the same as the local host.

Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。A、~/ .rhostsB、$HOME/.netrcC、/etc/hosts.equivD、/etc/security/user

Which command can be used to modify network options?()A、netstatB、ifconfigC、chdevD、no

The man page for command shows the following syntax: The man page for command shows the following syntax: command [ -a | -b ] Which of the following statements is true regarding this entry?()A、Either the -a or flag -b may be used, but not both.B、If the flag -a is used then the flag -b also must be used.C、One of the -a or -b flags must be used, but not both at the same time.D、Both the flags may be used together, but neither are mandatory.

Which three options can be used with the load CLI command?()A、mergeB、replaceC、partialD、completeE、override

Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure user Group Policy to achieve these results:    Allow users to view the options in the Offline Files dialog box   Remove the Offline Files tab from the Folder Options dialog box   Disable the Settings button in the Offline Files Status dialog box   Remove the Settings command from the Offline Files shortcut menu    Your proposed solution is to enable the group policy setting Disable user configuration of Offline Files.    Which results does the proposed solution provide?()A、Users can view the options in the Offline Files dialog boxB、The Offline Files tab is removed from the Folder Options dialog boxC、The Settings button in the Offline Files Status dialog box is disabledD、The Settings command is removed from the Offline Files shortcut menu

Which files can be used together to allow remote command execution on a server?()  A、/etc/.rhosts and $HOME/hosts.equivB、/etc/hosts.equiv and $HOME/.rhostsC、/etc/rhosts.equiv and $HOST/.rhostsD、/etc/hosts.equiv and $HOME/.hosts.equiv

单选题The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()AThe local and the remote host must have Transmission Control Protocol/Internet Protocol (TCP/IP) installed and configured. BThe remote host must support NFS. CThe remote host must have an NFS exported directory defined such that the local host has read and write permissions to the dump file on the remote host. DThe remote host can be the same as the local host.

多选题The RMAN BACKUP command using the DELETE INPUT option can be used with which three types of files? ()Adata filesBbackup setsCcontrol filesDarchived redo log files

单选题Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。A~/ .rhostsB$HOME/.netrcC/etc/hosts.equivD/etc/security/user

单选题Which command can be used to modify network options?()AnetstatBifconfigCchdevDno

单选题An administrator is at a remote data center assisting a colleague who is replacing a bad fibre channel  adapter.  Which command can be used to manage a hot plug slot without powering off or rebooting the  server()AdrslotBIsslotCIsattrDprtconf

多选题Which three options can be used with the load CLI command?()AmergeBreplaceCpartialDcompleteEoverride

多选题When executing the massload command to load catalog data into a WebSphere Commerce database on a remote DB2 server,which of the following can be used as valid values for the -method command line parameter?()AcreateBimportCloadDsqlimportEupdate

多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.