niusouti.com

单选题A user has used all of the allowed logon attempts for the userid. Which command can be used to reset the unsuccessful_login_count to 0 for that user?()A usrckB chsecC chuserD passwd

题目
单选题
A user has used all of the allowed logon attempts for the userid. Which command can be used to reset the unsuccessful_login_count to 0 for that user?()
A

usrck

B

chsec

C

chuser

D

passwd


相似考题
更多“单选题A user has used all of the allowed logon attempts for the userid. Which command can be used to reset the unsuccessful_login_count to 0 for that user?()A usrckB chsecC chuserD passwd”相关问题
  • 第1题:

    What is not a difference between VPN tunnel authentication and per-user authentication?()

    • A、VPN tunnel authentication is part of the IKE specification. 
    • B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
    • C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
    • D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

    正确答案:D

  • 第2题:

    A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()

    • A、reflexive
    • B、extended
    • C、standard
    • D、dynamic

    正确答案:D

  • 第3题:

    Which of the following is the MOST important reason for referencing the HCL?()

    • A、 To ensure that all hardware being used has previously been tested
    • B、 To ensure that all hardware being used has the latest firmware
    • C、 To ensure that all hardware being used is the most energy efficient
    • D、 To ensure that all hardware being used can be upgraded in the future

    正确答案:A

  • 第4题:

    A system administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this?()

    • A、usrck
    • B、sysck
    • C、lssec
    • D、lsuser

    正确答案:A

  • 第5题:

    Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()

    • A、REVOKE ALL PRIVILEGES FROM USER tom
    • B、REVOKE ALL ON EMPLOYEE FROM USER tom
    • C、REVOKE EXECUTE ON EMPLOYEE FROM USER tom
    • D、REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom

    正确答案:B

  • 第6题:

    Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()

    • A、It can be used to allow the access privilege settings for users but not roles.
    • B、It can be used to allow the access privilege settings for users as well as roles.
    • C、It can be used to control the time interval for which the access privilege is available to a user.
    • D、It can be used to selectively restrict the access for each user in a database to different host computers.
    • E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

    正确答案:B,C,D

  • 第7题:

    单选题
    Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()
    A

    aaa authentication enable method default

    B

    aaa authentication enable default

    C

    aaa authentication enable level

    D

    aaa authentication enable default local


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()
    A

    reflexive

    B

    extended

    C

    standard

    D

    dynamic


    正确答案: C
    解析: 暂无解析

  • 第9题:

    多选题
    Your multitenant container database (CDB) contains some pluggable databases (PDBs), you execute the following command in the root container: Which two statements are true?()
    A

    Schema objects owned by the C# # A_ADMIN common user can be shared across all PDBs.

    B

    The C # # A_ADMIN user will be able to use the TEMP_TS temporary tablespace only in root.

    C

    The command will, create a common user whose description is contained in the root and each pdb.

    D

    The schema for the common user C # # A_ADMIN can be different in each container.

    E

    The command will create a user in the root container only because the container clause is not used


    正确答案: A,D
    解析: 暂无解析

  • 第10题:

    单选题
    Which statement is true about the database and database-user used during installation of IMS Server?()
    A

    A preexisting database user may be used but a new database has to be created during installation.

    B

    A preexisting database may be used but a new database user has to be created during installation.

    C

    A preexisting database and user may be used or a new database and user are created during installation.

    D

    A preexisting database and user cannot be used; a new database and user are created during  installation.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    What is not a difference between VPN tunnel authentication and per-user authentication?()
    A

    VPN tunnel authentication is part of the IKE specification. 

    B

    VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).

    C

    User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 

    D

    802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    A user has used all of the allowed logon attempts for the userid. Which command can be used to reset the unsuccessful_login_count to 0 for that user?()
    A

    usrck

    B

    chsec

    C

    chuser

    D

    passwd


    正确答案: D
    解析: 暂无解析

  • 第13题:

    A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()

    • A、The user has a UID less than 200
    • B、The user has been defined as an administrative user
    • C、The file /usr/es/sbin/cluster/clpasswd is not executable by the user
    • D、The user needs explicit authorization to change their password cluster-wide

    正确答案:D

  • 第14题:

    A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()

    • A、EDIT
    • B、CHMOD
    • C、ATTRIB
    • D、CONVERT

    正确答案:C

  • 第15题:

    A user has used all of the allowed logon attempts for the userid. Which command can be used to reset the unsuccessful_login_count to 0 for that user?()

    • A、usrck
    • B、chsec
    • C、chuser
    • D、passwd

    正确答案:B

  • 第16题:

    Which statement is true about the database and database-user used during installation of IMS Server?()

    • A、A preexisting database user may be used but a new database has to be created during installation.
    • B、A preexisting database may be used but a new database user has to be created during installation.
    • C、A preexisting database and user may be used or a new database and user are created during installation.
    • D、A preexisting database and user cannot be used; a new database and user are created during  installation.

    正确答案:C

  • 第17题:

    A user wants to be permanently added to the dba group. Which command or process can be used to accomplish this?()

    • A、chgrp
    • B、chuser
    • C、setgroups
    • D、edit /etc/security/group

    正确答案:B

  • 第18题:

    You are designing a strategy for migrating the UNIX user accounts to Active Directory.  Which three actions should you perform?()

    • A、 Import the user accounts as inetOrgPerson objects.
    • B、 Import the user accounts into Active Directory by using the Ldifde command-line tool.
    • C、 Export all user accounts from the UNIX servers to a text file.
    • D、 Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
    • E、 Assign random passwords to each user object, and securely distribute the password to the users.
    • F、 Create the same strong password for each user object, and require users to change their passwords at first logon.
    • G、 Instruct users to use the same name and password as they used on the UNIX servers.

    正确答案:B,C,F

  • 第19题:

    单选题
    A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()
    A

    EDIT

    B

    CHMOD

    C

    ATTRIB

    D

    CONVERT


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()
    A

    The user has a UID less than 200

    B

    The user has been defined as an administrative user

    C

    The file /usr/es/sbin/cluster/clpasswd is not executable by the user

    D

    The user needs explicit authorization to change their password cluster-wide


    正确答案: A
    解析: 暂无解析

  • 第21题:

    多选题
    Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
    A

    It can be used to allow the access privilege settings for users but not roles.

    B

    It can be used to allow the access privilege settings for users as well as roles.

    C

    It can be used to control the time interval for which the access privilege is available to a user.

    D

    It can be used to selectively restrict the access for each user in a database to different host computers.

    E

    It can be used to selectively restrict a user's access to different applications in a specific host computer.


    正确答案: D,C
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following is the MOST important reason for referencing the HCL?()
    A

     To ensure that all hardware being used has previously been tested

    B

     To ensure that all hardware being used has the latest firmware

    C

     To ensure that all hardware being used is the most energy efficient

    D

     To ensure that all hardware being used can be upgraded in the future


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()
    A

    REVOKE ALL PRIVILEGES FROM USER tom

    B

    REVOKE ALL ON EMPLOYEE FROM USER tom

    C

    REVOKE EXECUTE ON EMPLOYEE FROM USER tom

    D

    REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    A user wants to be permanently added to the dba group. Which command or process can be used to accomplish this?()
    A

    chgrp

    B

    chuser

    C

    setgroups

    D

    edit /etc/security/group


    正确答案: A
    解析: 暂无解析