单选题A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()AEDITBCHMODCATTRIBDCONVERT

单选题
A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()
A

EDIT

B

CHMOD

C

ATTRIB

D

CONVERT


参考解析

解析: 暂无解析

相关考题:

A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?() A.EDITB.CHMODC.ATTRIBD.CONVERT

A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?()A、An IEEE-1394 deviceB、A NIC deviceC、An IrDA deviceD、A FDD device

Which two statements correctly describe the relation between a data file and the logical databasestructures()A、An extent cannot spread across data files.B、A segment cannot spread across data files.C、A data file can belong to only one tablespace.D、A data file can have only one segment created in it.E、A data block can spread across multiple data files as it can consist of multiple operating system (OS) blocks.

A corrupted file system is now repaired and back in use. Some, but not all of the files within the file  systems have been deleted. The only backup of this file system is a month-old tar archive. This archive will need to be restored as root.  Which two statements correctly describe the effects of the restore operation?()A、 Files found in the file system that are also on tape will NOT be overwritten.B、 The missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken.C、 The access times are preserved by tar and will reflect the time when a user last accessed the data.D、 The modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation.

A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A、The user copied to a read-only folder share.B、The user changed the attributes of the files.C、The user copied the files from the local My Documents folder.D、The user moved instead of copied the files.

A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A、EDITB、CHMODC、ATTRIBD、CONVERT

When migrating files from a Windows server A to a Samba server B with the command ’net rpc share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally belong only to a Windows group (no user) will generate errors during the migration. Which option in smb.conf will force such files to be mapped to the correct UNIX UID and GID?()A、 use acl = yesB、 map group acls = yesC、 force unknown acl user = yesD、 inherit acls = no

Your database is running In ARCIIIVELOG mode. One of the data files, USBRDATAOI. DBF, in the users tablespace is damaged and you need to recover the file until the point of failure. The backup for the data file is available.  Which three files would be used in the user-managed recovery process performed by the database administrator (DBA)?() A、 redo logsB、 control fileC、 temporary files of temporary tablespaceD、 the latest backup of only the damaged data fileE、 the latest backup of all the data files In the USERS tablespace

You have a read-only tablespace on read-only media. You want to perform a media recovery on the existing data files, but using a backup control file. The backup control file indicates that the status of the read-only tablespace was read/write when the control file was backed up. What should you consider?()A、 take data files from the read-only tablespace offline before performing a recoveryB、 recovery using backup control file is not possible, so restore all the files from the last full database backup, and then open the databaseC、 drop the read-only tablespace and re-create the tablespace after recoveryD、 perform a recovery; status of the tablespace in control file will be changed automatically

When performing an incomplete recover of the whole database, which data files must you restore? ()A、Only the damaged or lost data files.B、All of the data files of the database.C、Only the data files belonging to the SYSTEM tablespace.D、The data files belonging to the SYSTEM tablespace and the damaged or lost data files.

You have configured the flash recovery area to store online redo log files, control files, archived redo logs and RMAN backups. Which of the following files can you successfully delete from the flash recovery area if you want to reclaim the space within it?()A、 multiplexed control filesB、 RMAN obsolete backupsC、 multiplexed online redo log filesD、 archived redo logs that have not been copied to tape

You are the administrator of a computer named Computer1 that runs Windows 7. Several users shareComputer1. The users plan to encrypt files on the computer. You need to ensure that you can access allencrypted files on the computer.  What should you do first?()A、At a command prompt, run Cipher.exe.B、At a command prompt, run Certutil.exe.C、From the local computer policy, modify the User Rights Assignment.D、From User Accounts, run the Manage your file encryption certificates wizard.

You are a help desk technician for your company. All employees use Windows XP Professional computers. A salesperson named Philippe receives a removable disk drive cartridge from his supervisor. Philippe now reports that he cannot edit files on the cartridge. When he tries to open any files or folders on the cartridge, he receives an “access denied” error message. Philippe’s supervisor is currently out of the office. You place the cartridge in the removable drive on your computer. You receive the same “access denied” error message when you try to access the files and folders. You call Philippe’s supervisor. She asks you to grant permission to access the contents of the cartridge only to Philippe. However, she also wants to prevent Philippe from changing permissions on the contents of the cartridge. Which two actions should you take?()A、As Administrator, take ownership of the files and folders. B、As Administrator, grant your help desk user account Allow - Full Control permission on the files and folders.C、Grant Philippe Allow - Modify permission on the files and folders.D、Grant Philippe Allow - Full Control permission on the files and folders.E、Grant Philippe Allow - Take Ownership permission on the files and folders.

You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key andcertificate. You need to ensure that your user account can decrypt all EFS files on the  computer.  Whatshould you do?( )A、From Credential Manager, add a Windows credential.B、From Credential Manager, add a certificate-based credential.C、From the local computer policy, add a data recovery agent.D、From the local computer policy, modify the Restore files and directories setting.

You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure user Group Policy to achieve these results:    Allow users to view the options in the Offline Files dialog box   Remove the Offline Files tab from the Folder Options dialog box   Disable the Settings button in the Offline Files Status dialog box   Remove the Settings command from the Offline Files shortcut menu    Your proposed solution is to enable the group policy setting Disable user configuration of Offline Files.    Which results does the proposed solution provide?()A、Users can view the options in the Offline Files dialog boxB、The Offline Files tab is removed from the Folder Options dialog boxC、The Settings button in the Offline Files Status dialog box is disabledD、The Settings command is removed from the Offline Files shortcut menu

单选题Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()AAdd the list of files to /etc/exclude.rootvg.BModify the image.data file and add the files to be excluded form the backup.CModify the bosinst.data file and specify which files are to be excluded from the backup.DSpecify the files to be excluded on the command line when executing the mksysb command.

单选题When migrating files from a Windows server A to a Samba server B with the command ’net rpc share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally belong only to a Windows group (no user) will generate errors during the migration. Which option in smb.conf will force such files to be mapped to the correct UNIX UID and GID?()A use acl = yesB map group acls = yesC force unknown acl user = yesD inherit acls = no

单选题You are the network administrator for TestKing. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. A member server named TestkingA has a locally attached tape device. TestkingA contains several folders and files that are encrypted by using Encrypting File System (EFS). You create a new user account for a new employee named Victoria. Victoria's user account is member of the Users group only. You need to ensure that Victoria can back up the encrypted folders and files on TestkingA. Victoria must be assigned the minimum administrative privileges needed to complete this task. What should you do?()AAdd Victoria's domain user account to the Administrators group.BAdd Victoria's user account to the Backup Operators group.CAssign the Allow - Full Control permission on the encrypted folders and files to Victoria.DDesignate Victoria as a recovery agent for the encrypted files.

单选题A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()AInstruct User1 to create a new user certificate on Computer2.BInstruct User1 to take ownership of the encrypted files on Computer2.CInstruct User1 to import the user certificate from Computer1 to Computer2.  DLog on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.

单选题How can permissions be set up on /tmp so that a user cannot delete another user’s files?()Achmod +s /tmpBchmod 775 /tmpCchmod 1777 /tmpDchmod 4755 /tmp

单选题You have configured the flash recovery area to store online redo log files, control files, archived redo logs and RMAN backups. Which of the following files can you successfully delete from the flash recovery area if you want to reclaim the space within it?()A multiplexed control filesB RMAN obsolete backupsC multiplexed online redo log filesD archived redo logs that have not been copied to tape

多选题Which two statements correctly describe the relation between a data file and the logical databasestructures()AAn extent cannot spread across data files.BA segment cannot spread across data files.CA data file can belong to only one tablespace.DA data file can have only one segment created in it.EA data block can spread across multiple data files as it can consist of multiple operating system (OS) blocks.

单选题Your database operates in ARCHIVELOG mode and user/x7fmanaged consistent backups are performed every Sunday night. On Tuesday, at 9:00 a.m. the current log sequence number was 369. Also, on Tuesday you lost the data file belonging to the SYSTEM tablespace and an archivelog file (sequence number 356) that contained redo entries between 8:00 a.m. and 8:30 a.m. With reference to this scenario, what would you do to recover the database?()Arestore all the data files from last Sunday’s backup, and then perform a time­based recoveryBrestore all the data files from last Sunday’s backup, and then perform a cancel­based recoveryCrestore all the data files from last Sunday’s backup, and then perform a change­based recoveryDrestore only data files that belong to the SYSTEM tablespace from last Sunday’s backup, and then perform a complete recovery

多选题You are working on a database that must be functioning 24 hours a day, 7 days a week. The databaseis configured in ARCHIVELOG mode.  Which two options do you have for performing user-managed backups()AYou can perform consistent backups only.BYou can perform a complete database backup without shutting down the database instance.CYou can back up data files only when all data files have the same SCN recorded in the control file.DYou can back up only those data files whose headers are frozen by using ALTER TABLESPACE BEGINBACKUP or ALTER DATABASE BEGIN BACKUP commands.

多选题You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure user Group Policy to achieve these results:    Allow users to view the options in the Offline Files dialog box   Remove the Offline Files tab from the Folder Options dialog box   Disable the Settings button in the Offline Files Status dialog box   Remove the Settings command from the Offline Files shortcut menu    Your proposed solution is to enable the group policy setting Disable user configuration of Offline Files.    Which results does the proposed solution provide?()AUsers can view the options in the Offline Files dialog boxBThe Offline Files tab is removed from the Folder Options dialog boxCThe Settings button in the Offline Files Status dialog box is disabledDThe Settings command is removed from the Offline Files shortcut menu

单选题Saul needs access to files that are in the Accounting folder on his computer. A local group named accounting is granted full control permission to the accounting folder and the files within it. Saul is a member of the accounting local group but he cannot access the files that he needs.  What should you do?()AGrant Saul NTFS permission so that he can access any parent folder or files in the shared sales folder.BShare the Sales folder and grant Saul shared folder permission to access the shared sales folder.CRemove Saul from any other groups that have been explicitly denied access to the accounting folder.DDelete the Sales local group and recreate, add individual user accounts from the sales department back into sales local group.

单选题A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()AThe user copied to a read-only folder share.BThe user changed the attributes of the files.CThe user copied the files from the local My Documents folder.DThe user moved instead of copied the files.

单选题You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()ALog on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. BCreate a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. CRemove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. DBack up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files.