单选题Which action change the default editor for ALL users on the system from vi to edit()AIssue the command: export EDITOR=/usr/bin/edit edit each user .profile to change the EDITOR value to /usr/bin/editBModify /.profile and change the EDITOR variable to /usr/bin/editCModify /etc/environment and add EDITOR=/usr/bin/edit export EDITORDModify /etc/security/defaults and change the EDITOR value to /usr/bin/edit

单选题
Which action change the default editor for ALL users on the system from vi to edit()
A

Issue the command: export EDITOR=/usr/bin/edit edit each user .profile to change the EDITOR value to /usr/bin/edit

B

Modify /.profile and change the EDITOR variable to /usr/bin/edit

C

Modify /etc/environment and add EDITOR=/usr/bin/edit export EDITOR

D

Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit


参考解析

解析: 暂无解析

相关考题:

Which two statements are true with regard to policy ordering? ()(Choose two.) A. The last policy is the default policy, which allows all traffic.B. The order of policies is not important.C. New policies are placed at the end of the policy list.D. The insert command can be used to change the order.

A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?()A. Change the default administrator passwordB. Change the IP range of the wireless networkC. Hide the SSIDD. Disable WEP

Users are complaining of slow performance. The iostat command indicates hdiskxxx is extremely busy. There is no activity on any other hdisks in the same volume group. Which of the following is the best action to take?()A.Change intra policy to outerB.Change intra policy to centerC.Change inter policy to maximumD.Increase the physical partition size

Your company has recently deployed a server that runs windows server 2008. The server has the ip information shown below.Ip address 192.168.46.186Subnet mask: 255.255.255.192Default gateway: 192.168.46.1Users on remote subnets report that they are unable to connect to the server.You need to ensure all users are able to connect to the server.What should you do?()A、Change the IP address to192.168.46.129B、Change the IPaddress to192.168.46.200C、Change thes ubnet mask to a 24-bitmaskD、Change the subnet mask to a 27-bitmask.

Which action changes the default editor for ALL users on the system from vi to edit?()A、Issue the command:export EDITOR=/usr/bin/edit edit each users .profile to change the EDITOR value to /usr/bin/editB、Modify /.profile and change the EDITOR variable to /usr/bin/editC、Modify /etc/environment and add EDITOR=/usr/bin/edit export EDITORD、Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit

A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?()A、Change the default administrator passwordB、Change the IP range of the wireless networkC、Hide the SSIDD、Disable WEP

When implementing a solution to a problem, which of the following is the BEST course of action to take?()A、 Replace all components simultaneously to ensure that the system is functional.B、 Replace all hardware associated with the problem first to eliminate the possibility of hardware and move onto software.C、 Purchase new parts for the system to confirm that they function.D、 Implement one change at a time, reversing the change if it has not resolved the problem.

Which of the following is the FIRST course of action before implementing a change to a server?()A、 Survey users to get their response to the potential server change.B、 The change should be approved by management.C、 Switch over to the alternate site so users are not affected.D、 Implement RAID so the server does not go offline.

When setting security permissions on a folder, which of the following properties apply?()A、Guest users are allowed changed permissions.B、All sub-folders inherit the most restrictive permissions within the folder.C、All sub-folders within that folder are given a password.D、By default, read permissions are denied on all files within the folder.

A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()A、remove all other groups from the systemB、run the command mkuser -default "GROUP=database"C、change the default group in /usr/lib/security/mkuser.defaultD、edit /etc/security/group to move all users to the database stanza

A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

Users are complaining of slow performance. The iostat command indicates hdiskxxx is extremely busy. There is no activity on any other hdisks in the same volume group. Which of the following is the best action to take?()A、Change intra policy to outerB、Change intra policy to centerC、Change inter policy to maximumD、Increase the physical partition size

A system administrator would like to modify the system default user characteristics so that each new user will now be assigned (by default) the csh shell rather than the ksh shell. Which of the following actions should be performed?()A、Run the command chlogin -shell "csh"B、Run the command mkuser -default "SHELL=csh"C、Edit /etc/passwd and change all "ksh" entries to "csh"D、Modify the contents of /usr/lib/security/mkuser.default file

View the Exhibit.You executed the following command to perform a backup of the USERS tablespace: RMAN BACKUP TABLESPACE USERS;  Which three types of files are backed up? ()A、 all the data files belonging to the USERS tablespaceB、 password fileC、 online redo log filesD、 the current control fileE、 archived redo log filesF、 the current server parameter fileG、 data files belonging to the USERS tablespace and all the default tablespaces

You are a systems administrator responsible for deploying Windows SharePoint Services (WSS) for accessby users from an external business partner. You have installed the appropriate server role and have verified that the SharePoint Web site loads properly from the local server computer. All options are usingtheir installation default values. External users report that they cannot log on to the site. Which of thefollowing changes should you make to resolve the problem?()A、Create a new site within an existing site collection for the external users.B、Create a new site collection for the external users.C、Change the authentication mode for the Web application to Forms authentication.D、Modify the User Permissions For Web Applications settings.

You are the network administrator for . The network consists of a single Active Directory domain named . All servers run Windows Server 2003. All client computers run Windows XP Professional. The network contains a domain controller named TestKing3. You create a preconfigured user profile on a client computer named TKClient1. You need to ensure that all users receive the preconfigured user profile when they log on to the network for the first time. All users must still be able to personalize their desktop environments. What should you do?()A、From TKClient1, copy the user profile to //TestKing3/netlogon/Default User.B、From TKClient1, copy the user profile to //TestKing3/netlogon/Default User. Change the User Profile path for all users in the Active Directory to //TestKing3/netlogon/Default. User.C、From TKClient1, copy the user profile to the C:/Documents and Settings/Default User folder. Share the Default User profile on the network.D、Create a Folder Redirection policy in Active Directory.

单选题A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()Aremove all other groups from the systemBrun the command mkuser -default GROUP=databaseCchange the default group in /usr/lib/security/mkuser.defaultDedit /etc/security/group to move all users to the database stanza

单选题Which of the following is the FIRST course of action before implementing a change to a server?()ASurvey users to get their response to the potential server change.BThe change should be approved by management.CSwitch over to the alternate site so users are not affected.DImplement RAID so the server does not go offline.

多选题View the Exhibit.You executed the following command to perform a backup of the USERS tablespace: RMAN BACKUP TABLESPACE USERS;  Which three types of files are backed up? ()Aall the data files belonging to the USERS tablespaceBpassword fileConline redo log filesDthe current control fileEarchived redo log filesFthe current server parameter fileGdata files belonging to the USERS tablespace and all the default tablespaces

单选题Which action changes the default editor for ALL users on the system from vi to edit of the following?()AIssue the command:  export EDITOR=/usr/bin/editBModify /.profile and change the EDITOR variable to /usr/bin/editCModify /etc/environment and add  EDITOR=/usr/bin/edit  export EDITORDModify /etc/security/defaults and change the EDITOR value to /usr/bin/edit

单选题When implementing a solution to a problem, which of the following is the BEST course of action to take?()A Replace all components simultaneously to ensure that the system is functional.B Replace all hardware associated with the problem first to eliminate the possibility of hardware and move onto software.C Purchase new parts for the system to confirm that they function.D Implement one change at a time, reversing the change if it has not resolved the problem.

单选题You work as a database administrator for Supportcenter.cn. You find that users with DBA role are using more CPU resources than what is allocated in their profiles. Which action would you take to ensure that resources limits are imposed on these users?()AAssign the DEFAULT profile to the usersBSet the RESOURCE_LIMIT parameter to TRUE in the parameter fileCCreate a new profile with CPU restrictions and assign it to the usersDSpecify the users as members of the DEFAULT_CONSUMER_GROUPERevoke the DBA role and grant CONNECT and RESOURCE role to the users

单选题When implementing a solution to a problem, which of the following is the BEST course of action to take?()AReplace all components simultaneously to ensure that the system is functional.BReplace all hardware associated with the problem first to eliminate the possibility of hardware and move onto softwareCPurchase new parts for the system to confirm that they function.DImplement one change at a time, reversing the change if it has not resolved the problem.

多选题You are designing a strategy of enforce the corporate security policy. Which action or actions should you perform?()AConfigure a password policy that requires strong passwordsBConfigure a password policy that requires all users to change their passwords once a month.CAllow users in the branch offices to log on between the hours of 8:00 AM and 5:00 PM, Monday through Friday.DAllow users in the retail outlets to log on between the hours of 6:00 AM and 11:00 PM, daily.EEnable a policy that forces users to log off when their logon hours expire.

单选题The DBA is defining role for users. Which of the following is not an acceptable method for defining a default role?()AALTER USER DEFAULT ROLE ALLBALTER USER DEFAULT ROLE ALL EXCEPT ROLE_1CALTER USER DEFAULT ROLE NONEDALTER USER DEFAULT ROLE NONE EXCEPT ROLE_1

单选题Your company has recently deployed a server that runs Windows Server 2008. The server has the IP information shown below. IP address 192.168.46.186 Subnet mask: 255.255.255.192 Default gateway: 192.168.46.1 Users on remote subnets report that they are unable to connect to the server. You need to ensure all users are able to connect to the server. What should you do? ()A Change the IP address to 192.168.46.129B Change the IP address to 192.168.46.200C Change the subnet mask to a 24-bit maskD Change the subnet mask to a 27-bit mask.

单选题Which of the following is the FIRST course of action before implementing a change to a server?()A Survey users to get their response to the potential server change.B The change should be approved by management.C Switch over to the alternate site so users are not affected.D Implement RAID so the server does not go offline.