单选题For security reasons, an administrator is asked to modify the system to prevent someone from  leaving a terminal logged in.  Which of the following options would enable a five minute timeout for all users()AAdd the following line to /etc/environment: TMOUT=300BAdd the following lines to /.profile TMOUT=5 export TMOUTCRun the following command: chuser -u ALL -a TIMEOUT=5MDRun the following command: chsec -u ALL -a TIMEOUT=600

单选题
For security reasons, an administrator is asked to modify the system to prevent someone from  leaving a terminal logged in.  Which of the following options would enable a five minute timeout for all users()
A

Add the following line to /etc/environment: TMOUT=300

B

Add the following lines to /.profile TMOUT=5 export TMOUT

C

Run the following command: chuser -u ALL -a TIMEOUT=5M

D

Run the following command: chsec -u ALL -a TIMEOUT=600


参考解析

解析: 暂无解析

相关考题:

Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?() A.Add the list of files to /etc/exclude.rootvg.B.Modify the image.data file and add the files to be excluded form the backup.C.Modify the bosinst.data file and specify which files are to be excluded from the backup.D.Specify the files to be excluded on the command line when executing the mksysb command.

Which action change the default editor for ALL users on the system from vi to edit()A、Issue the command: export EDITOR=/usr/bin/edit edit each user .profile to change the EDITOR value to /usr/bin/editB、Modify /.profile and change the EDITOR variable to /usr/bin/editC、Modify /etc/environment and add EDITOR=/usr/bin/edit export EDITORD、Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit

Which action changes the default editor for ALL users on the system from vi to edit of the following?()A、Issue the command:  export EDITOR=/usr/bin/editB、Modify /.profile and change the EDITOR variable to /usr/bin/editC、Modify /etc/environment and add  EDITOR=/usr/bin/edit  export EDITORD、Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit

Which action changes the default editor for ALL users on the system from vi to edit?()A、Issue the command:export EDITOR=/usr/bin/edit edit each users .profile to change the EDITOR value to /usr/bin/editB、Modify /.profile and change the EDITOR variable to /usr/bin/editC、Modify /etc/environment and add EDITOR=/usr/bin/edit export EDITORD、Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit

On a system wide basis, which of the following procedures is best to make NIS name resolution take precedence over DNS?()A、Remove the /etc/resolv.conf fileB、Unset the NSORDER environment variableC、Add the following line to /etc/netsvc.conf: hosts=nis,bind,localD、In a NIS and DNS environment, NIS takes precedence so there is nothing to change

A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()A、remove all other groups from the systemB、run the command mkuser -default "GROUP=database"C、change the default group in /usr/lib/security/mkuser.defaultD、edit /etc/security/group to move all users to the database stanza

A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A、Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B、Increase the number of licenses; using smit chaili censeC、Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D、Change User can logi field from false to true: using smit chuser.

Which of the following procedures best explains how to enable the NIS name resolution to take precedence over DNS on a system-wide basis?()A、 Add the following line to /etc/netsvc.conf: hosts = nis,bind,local B、 edit /etc/netsvc.conf to add the following: process /full/path/of/process /{ hosts = local,nis,dns} C、 In an NIS and DNS environment, NIS takes precedence over DNS in this environment resulting in no change D、 Change the NSORDER environment variable

For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. To enable a five minute timeout for all users, what would need to be done to accomplish this task?()A、Add the following line to /etc/environment:  TMOUT=300B、Add the following lines to /.profile  TMOUT=5  export TMOUTC、Execute the following command:  chuser -u ALL -a TIMEOUT=5MD、Execute the following command:  chsec -u ALL -a TIMEOUT=600

For security reasons, an administrator is asked to modify the system to prevent someone from  leaving a terminal logged in.  Which of the following options would enable a five minute timeout for all users()A、Add the following line to /etc/environment: TMOUT=300B、Add the following lines to /.profile TMOUT=5 export TMOUTC、Run the following command: chuser -u ALL -a TIMEOUT=5MD、Run the following command: chsec -u ALL -a TIMEOUT=600

A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()  A、 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B、 Use C-SPOC to synchronize the password files between cluster nodes.C、 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D、 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

A system administrator would like to modify the system default user characteristics so that each new user will now be assigned (by default) the csh shell rather than the ksh shell. Which of the following actions should be performed?()A、Run the command chlogin -shell "csh"B、Run the command mkuser -default "SHELL=csh"C、Edit /etc/passwd and change all "ksh" entries to "csh"D、Modify the contents of /usr/lib/security/mkuser.default file

Which of the following commands would an administrator use to add startup scripts to the system startup process()A、chitabB、vi /etc/inittabC、vi /etc/rc.dD、mkitab

You are an enterprise administrator for Cer-tech .com. All the servers on the network run Windows Server2008. The network consists of a Terminal Server. Which of the following options would you choose toconfigure the Terminal Server to end any sessions that are inactive for more than one hour?()A、Modify the RDP-Tcp settings from Terminal Services Configuration.B、Modify the User logon mode setting from Terminal Services Configuration.C、Create a new group from Terminal Services Manager.D、Delete the inactive sessions from Terminal Services Manager.

You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runsTerminal services to enable remote users to run commonly required applications from their terminal. A remote user logged on to the Terminal Server, required some help on the application he wanted to run.However,when you connect to the Terminal Server session,you cannot operate any applications. Which of the following options would you choose to ensure that you can assist any user on the Terminal Server?()A、From the Terminal Server, run the Chguserver /execute command and then reconnect to the session.B、In the RDP-Tcp Properties on the Terminal Server, enable the Use remote control option with default user settings.C、In the RDP-Tcp Properties on the Terminal Server, enable the Use remote control with the following settings option and then configure the Level of control policy setting to Interact with the session. Ask the user to log off and log back on.D、From the Terminal Server, run the Tscon /v command and then reconnect to the session.

单选题For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. To enable a five minute timeout for all users, what would need to be done to accomplish this task?()AAdd the following line to /etc/environment:  TMOUT=300BAdd the following lines to /.profile  TMOUT=5  export TMOUTCExecute the following command:  chuser -u ALL -a TIMEOUT=5MDExecute the following command:  chsec -u ALL -a TIMEOUT=600

单选题Which of the following procedures best explains how to enable the NIS name resolution to take precedence over DNS on a system-wide basis?()A Add the following line to /etc/netsvc.conf: hosts = nis,bind,local B edit /etc/netsvc.conf to add the following: process /full/path/of/process /{ hosts = local,nis,dns} C In an NIS and DNS environment, NIS takes precedence over DNS in this environment resulting in no change D Change the NSORDER environment variable

单选题A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()Aremove all other groups from the systemBrun the command mkuser -default GROUP=databaseCchange the default group in /usr/lib/security/mkuser.defaultDedit /etc/security/group to move all users to the database stanza

单选题For security reasons, an administrator is asked to modify the system to prevent someone from  leaving a terminal logged in.  Which of the following options would enable a five minute timeout for all users()AAdd the following line to /etc/environment: TMOUT=300BAdd the following lines to /.profile TMOUT=5 export TMOUTCRun the following command: chuser -u ALL -a TIMEOUT=5MDRun the following command: chsec -u ALL -a TIMEOUT=600

单选题A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()Afwtmp  /etc/security/failedloginBcat /etc/security/failedloginCwhoDalog -f /etc/security/failedlogin -o

单选题Which of the following commands would an administrator use to add startup scripts to the system startup process()AchitabBvi /etc/inittabCvi /etc/rc.dDmkitab

单选题You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runsTerminal services to enable remote users to run commonly required applications from their terminal. Aremote user logged on to the Terminal Server, required some help on the application he wanted to run.However, when you connect to the Terminal Server session, you cannot operate any applications. Which ofthe following options would you choose to ensure that you can assist any user on the Terminal Server?()AFrom the Terminal Server,run the Chguserver /execute command and then reconnect to the session.BIn the RDP-Tcp Properties on the Terminal Server,enable the Use remote control option with defaultuser settings.CIn the RDP-Tcp Properties on the Terminal Server,enable the Use remote control with the following settings option and then configure the Level of control policy setting to Interact with the session. Ask theuser to log off and log back on.DFrom the Terminal Server,run the Tscon /v command and then reconnect to the session.

单选题A system administrator would like to modify the system default user characteristics so that each new user will now be assigned (by default) the csh shell rather than the ksh shell. Which of the following actions should be performed?()ARun the command chlogin -shell cshBRun the command mkuser -default SHELL=cshCEdit /etc/passwd and change all ksh entries to cshDModify the contents of /usr/lib/security/mkuser.default file

单选题A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A/etc/security/limitsB/etc/security/mkuser.sysC/etc/security/privD/etc/security/user

单选题A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()APermissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.BIncrease the number of licenses; using smit chaili censeCChange the Maximum number of PROCESSES allowed per user variable; using smit chgsys.DChange User can logi field from false to true: using smit chuser.

单选题The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()A On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B Use C-SPOC to synchronize the password files between cluster nodes.C On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

单选题Which action changes the default editor for ALL users on the system from vi to edit of the following?()AIssue the command:  export EDITOR=/usr/bin/editBModify /.profile and change the EDITOR variable to /usr/bin/editCModify /etc/environment and add  EDITOR=/usr/bin/edit  export EDITORDModify /etc/security/defaults and change the EDITOR value to /usr/bin/edit