多选题Which of the following is true about the following share access properties? ()A+managers will be resolved as a Winbind group.BThe timo and taki users can manipulate files regardless of the file system permissions.C+managers will be resolved as a Unix group.D+managers is a builtin default Samba group.EThe admin users can be applied only to print shares.

多选题
Which of the following is true about the following share access properties? ()
A

+managers will be resolved as a Winbind group.

B

The timo and taki users can manipulate files regardless of the file system permissions.

C

+managers will be resolved as a Unix group.

D

+managers is a builtin default Samba group.

E

The admin users can be applied only to print shares.


参考解析

解析: 暂无解析

相关考题:

you configure a new file server that runs windows server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files.The TCP/IP properties for the file server are configured as shown in the following exhibit.You need to ensure that users are able to access the shared files. What should you do?()A.Configure a static IP address.B.Configure the default gateway.C.Configure the DNS server address.D.Add the domain to the DNS suffix on the network interface.

A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read

Which of the following tools restricts device installation?() A. Default domain policyB. Group PolicyC. Disk ManagementD. File share properties

Which of the following is true about the following share access properties? ()A、 +managers will be resolved as a Winbind group.  B、 The timo and taki users can manipulate files regardless of the file system permissions.  C、 +managers will be resolved as a Unix group.  D、 +managers is a builtin default Samba group.  E、 The "admin users" can be applied only to print shares.

Which of the following tools restricts device installation?()A、Default domain policyB、Group PolicyC、Disk ManagementD、File share properties

Which of the following allows users to recover their deleted files on file shares by themselves?()A、Windows restoreB、Windows backupC、Shadow copiesD、Shadow backup

Which of the following statements is TRUE about the primary system dump device?()A、 It is shared. B、 It must be /dev/hd6. C、 It must be an internal disk. D、 It can be an external device.

A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read

Users in an office routinely work with large graphics files. Which of the following preventivemaintenance tools can assist in maintaining system performance?()A、FPROTB、DEFRAGC、CHKDSKD、SFC

When making changes to a server, which of the following is the BEST way to troubleshoot a problem?()A、 Perform root cause analysis and then test the theory to determine the cause.B、 Make changes to the system and document everything once the problem is resolved.C、 Make multiple changes to all affected areas to resolve all potential issues.D、 Make a change and if the problem is not resolved, reverse the change.

The ‘fsck -p /dev/lv00’ command returned the following message:Not a recognized filesystem type. What is the likely cause of the problem and how should it be resolved?()A、The file system superblock is dirty. It can be replaced from the VGDAB、The logical volume superblock is dirty. It can be replaced from the VGDAC、The file system superblock is dirty. It can be replaced from the secondary copyD、The logical volume superblock is dirty. It can be replaced from the secondary copy

Which of the following are TRUE about a store archive?()A、It is an XML file containing store data assetsB、It uses the same file format as a ZIP fileC、It contains file assets to create a store or siteD、It can easily be copied from one machine to anotherE、It can contain WebSphere Commerce instance configuration information

You Execute the Following command to create a password file in the database server: $ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’ Which two statements are true about the password file?()A、It records the usernames and passwords of users when granted the DBA role.B、It contains the usernames and passwords of users for whom auditing is enabled.C、Is used by Oracle to authenticate users for remote database administration.D、It records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.E、It supports the SYSBACKUP, SYSDG, and SYSKM system privileges.

Which statement is true about the loss of system/x7fcritical data files in ARCHIVELOG mode?()A、The data files can be recovered till the last committed transaction.B、The data files can be recovered without shutting down the database.C、The data file is taken offline automatically; the database remains open.D、The data files can be recovered to the time of the most recent backup.

Which statement is true regarding the retention policy for the incidents accumulated in the Automatic Diagnostic Repository (ADR)?()  A、 The incident metadata is purged when the problem is resolved and the DBA closes the SRB、 The incident files and dumps are not retained in the ADR for the manually created incidents C、 The incident files are retained but the incident metadata is purged when the problem is resolved and the DBA closes the SRD、 The default setting is for one year after which the incident metadata is purged from the ADR and the files are retained for one month

Which statement is true regarding the retention policy for the incidents accumulated in the AutomaticDiagnostic Repository (ADR)?()A、The incident metadata is purged when the problem is resolved and the DBA closes the SRB、The incident files and dumps are not retained in the ADR for the manually created incidentsC、The incident files are retained but the incident metadata is purged when the problem is resolved and the DBA closes the SRD、The default setting is for one year after which the incident metadata is purged from the ADR and the files are retained for one month

Which two statements about Automatic Storage Management (ASM) are true?()A、ASM provides mirroring on file by file basis.B、ASM provides automatic load balancing across all ASM disks.C、ASM supports the Oracle database and operating system files.D、ASM can be used to store trace files, alert log files, and the server parameter file (SPFILE).

Which statement is true about the loss of system-critical data files in ARCHIVELOG mode?()A、The data files can be recovered till the last committed transaction.B、The data files can be recovered without shutting down the database.C、The data file is taken offline automatically; the database remains open.D、The data files can be recovered to the time of the most recent backup.

You have created a password file using the following command:   ORAPWD file=d:/oracle/ora9i/orapwU01 password=change_on_install entries=3   Which of the following is true about this password file?()A、 If the REMOTE_LOGIN_PASSWORDFILE parameter is set to SHARED in the initialization parameter file, then a maximum of three users can be granted the SYSDBA or SYSOPER privileges.B、 If the REMOTE_LOGIN_PASSWORDFILE parameter is set to EXCLUSIVE in the initialization parameter file, then a maximum of three users can be granted the SYSDBA or SYSOPER privileges.C、 If the REMOTE_LOGIN_PASSWORDFILE parameter is set to SHARED in the initialization parameter file, then the SYSDBA and SYSOPER privileges can be granted to other users as long as space in the password file isD、 If the REMOTE_LOGIN_PASSWORDFILE parameter is set to EXCLUSIVE in the initialization parameter file, then the SYSDBAand SYSOPER privileges can be granted to other users as long as space in the password file is available.

you configure a new file server that runs windows server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files.The TCP/IP properties for the file server are configured as shown in the following exhibit.You need to ensure that users are able to access the shared files. What should you do?()A、Configure a static IP address.B、Configure the default gateway.C、Configure the DNS server address.D、Add the domain to the DNS suffix on the network interface.

You configure a new file server that runs Windows Server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files. The TCP/IP properties for the file server are configured as shown in the following exhibit.(exhibit not there again wtf!) You need to ensure that users are able to access the shared files. How should you configure the TCP/IP properties in the file server?()A、Configure a static IP addressB、Configure the default gatewayC、Configure the DNS server addressD、Add the domain to the DNS suffix on the network interface

多选题You Execute the Following command to create a password file in the database server: $ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’ Which two statements are true about the password file?()AIt records the usernames and passwords of users when granted the DBA role.BIt contains the usernames and passwords of users for whom auditing is enabled.CIs used by Oracle to authenticate users for remote database administration.DIt records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.EIt supports the SYSBACKUP, SYSDG, and SYSKM system privileges.

多选题Which two statements about Automatic Storage Management (ASM) are true?()AASM provides mirroring on file by file basis.BASM provides automatic load balancing across all ASM disks.CASM supports the Oracle database and operating system files.DASM can be used to store trace files, alert log files, and the server parameter file (SPFILE).

单选题Which of the following tools restricts device installation?()A Default domain policyB Group PolicyC Disk ManagementD File share properties

单选题The ‘fsck -p /dev/lv00’ command returned the following message:Not a recognized filesystem type. What is the likely cause of the problem and how should it be resolved?()AThe file system superblock is dirty. It can be replaced from the VGDABThe logical volume superblock is dirty. It can be replaced from the VGDACThe file system superblock is dirty. It can be replaced from the secondary copyDThe logical volume superblock is dirty. It can be replaced from the secondary copy

多选题Which of the following are contained in a store archive?()Aa JAR file containing commands and JSPsBan XML file defining the content of the store archiveCa ZIP file of Java properties files containing translated textDa database backup file used to define store dataEa number of ZIP files used to define store data

多选题Which of the following are TRUE about a store archive?()AIt is an XML file containing store data assetsBIt uses the same file format as a ZIP fileCIt contains file assets to create a store or siteDIt can easily be copied from one machine to anotherEIt can contain WebSphere Commerce instance configuration information