niusouti.com

单选题An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The

题目
单选题
An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following ?n?command failed to create the link.ln/db/v9.7/install/config /etc/db_conf. Which option should be used when re-running the command to resolve the problem?()
A

-s flag to create a soft link

B

-n flag to force create a hard link

C

-N flag to force create a hard link

D

-S flag to force create a soft link


相似考题
更多“An administrator attempts to create a link of /etc/db_conf t”相关问题
  • 第1题:

    以下Gr配置中属于MTP3 Management的为()。

    • A、List Load Share
    • B、Create Link set
    • C、Create Signaling point
    • D、Create GT Conversion rule

    正确答案:A,B,C

  • 第2题:

    he system administrator is making system wide changes to a server, which will add to the PATH variable for the server environment.  Where is the PATH variable found for the system?()

    • A、/profile
    • B、/etc/envpath
    • C、/etc/profile
    • D、/etc/environment

    正确答案:D

  • 第3题:

    What is the process for creating an NFS mount between two servers in the same network zone?()

    • A、Export the desired filesystem in the /etc/nfs file, run ’exportfs -a’,create a mount directory on the desired server, and mount the NFS filesystem.
    • B、Run ’exportfs -a’,export the desired filesystem in the /etc/nfs file,create a mount directory on the desired server, and mount the NFS filesystem.
    • C、Export the desired filesystem in the /etc/exports file, run ’exportfs -a’,create a mount directory on the desired server,and mount the NFS filesystem.
    • D、Run ’exportfs -u’,export the desired filesystem in the /etc/exports file, create a mount directory on the desired server,and mount the NFS filesystem.

    正确答案:C

  • 第4题:

    A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()

    • A、/etc/security/limits
    • B、/etc/security/mkuser.sys
    • C、/etc/security/priv
    • D、/etc/security/user

    正确答案:D

  • 第5题:

    An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following command failed to create the link:  ln /db/v9.7/install/config /etc/db_conf   Which option should be used when re-running the command to resolve the problem?()  

    • A、-s flag to create a soft link
    • B、-n flag to force create a hard link
    • C、-N flag to force create a hard link
    • D、-S flag to force create a soft link

    正确答案:A

  • 第6题:

    The system administrator is making system wide changes to a server, which will add to the PATH variable for the server environment. Where is the PATH variable found for the system?()

    • A、/profile
    • B、/etc/envpath
    • C、/etc/profile
    • D、/etc/environment

    正确答案:D

  • 第7题:

    You are designing for implementing Group Policy objects (GPOs) to meet the business and technical requirement. What should you do?()

    • A、Create one new GPO to enforce software restriction policies. Link this GPO to the domain.
    • B、Create one new GPO to enforce software restriction policies. Link this GPO to the appropriate  organizational unit (OU).
    • C、Create one new GPO to enforce software restriction policies. Link this GPO to all organizational units (OUs).
    • D、Create new GPOs to match the number of organizational units (OUs).configure these GPOs to enforce software restriction policies. Link this GPO to its respective OU.

    正确答案:A

  • 第8题:

    A system administrator has created tty2 on a serial port connection to a system.  When attempting to verify the connection the following error is observed:   # cu -ml tty2   cu: 0835-028 The connection failed. NO DEVICES AVAILABLE. Which of the following should be performed to correct this error?()

    • A、Create an entry for tty2 in the /etc/uucp/Devices file
    • B、Re-enter the command as "cu -dml tty2"
    • C、Create an entry for tty2 in the /etc/uucp/Systems file
    • D、Re-enter the command as "cu -s 9600 -dh -t -l tty2"

    正确答案:A

  • 第9题:

    You are the administrator of a SQL Server 2005 computer named SQL1. SQL1 is a member of a Microsoft Active Directory domain. You do not have any rights or privileges to perform domain administration. However, you have been granted membership in the local Administrators group on SQL1. You perform most of the management of SQL1 from your administrative workstation. However, for security reasons, you want to track all attempts for interactive logons and network connections to SQL1. What should you do?()

    • A、Create a Group Policy object (GPO) that is configured for success and failure auditing of the Audit account logon events setting. Ask the domain administrator to link the GPO to the object containing SQL1.
    • B、Configure the SQL Server service on SQL1 to audit all successful and failed logon attempts.
    • C、Edit the local security policy of SQL1. Then, configure success and failure auditing on the Audit logon events setting.
    • D、Run the SQL Server Profiler and use a standard default template.

    正确答案:C

  • 第10题:

    单选题
    An administrator attempts to add a new 100GB logical volume to the datavg volume group, which resides on hdisk1.  How can the administrator easily determine if there is enough space in datavg to create the logical volume()
    A

    lslg datavg

    B

    lspv datavg

    C

    lsvg datavg

    D

    lslv hdisk1


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()
    A

    Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

    B

    Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO

    C

    Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO

    D

    Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    What system startup file would an administrator edit for starting up miscellaneous third party applications?()
    A

    /etc/rc.net

    B

    /etc/rc.boot

    C

    /etc/rc.local

    D

    /etc/rc.tcpip


    正确答案: B
    解析: 暂无解析

  • 第13题:

    An administrator attempts a traceroute but receives a "Destination Unreadable" message. Which protocol is responsible for that message?()

    • A、RARP
    • B、RUDP
    • C、ICMP
    • D、SNMP

    正确答案:C

  • 第14题:

    A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()

    • A、fwtmp < /etc/security/failedlogin
    • B、cat /etc/security/failedlogin
    • C、who
    • D、alog -f /etc/security/failedlogin -o

    正确答案:A

  • 第15题:

    A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh  commands by the root user return with a permission error message. What action will resolve the problem?()

    • A、Add root user to the /etc/hosts.equiv on serverB .
    • B、Create $HOME/.rhosts file for the root user on serverB .
    • C、Restart the rshd daemon with root enabled option on serverB .
    • D、Add entry to allow root user from serverA to the /etc/hosts.allow on serverB .

    正确答案:D

  • 第16题:

    A system administrator wants to couple two servers together so that users from server A can access server B without entering their password. How would this be accomplished?()

    • A、employ NIS to synchronize user names and passwords
    • B、create a /.rhosts on server A and serve B
    • C、create a $HOME/.netrc for all users on server A and serve rB
    • D、create a /etc/hosts.equiv on server A and server B

    正确答案:D

  • 第17题:

    An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following ?n?command failed to create the link.ln/db/v9.7/install/config /etc/db_conf. Which option should be used when re-running the command to resolve the problem?()

    • A、-s flag to create a soft link
    • B、-n flag to force create a hard link
    • C、-N flag to force create a hard link
    • D、-S flag to force create a soft link

    正确答案:A

  • 第18题:

    You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()

    • A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
    • B、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
    • C、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
    • D、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

    正确答案:D

  • 第19题:

    All consultants belong to a global group named TempWorkers.     You place three file servers in a new organizational unit named SecureServers. The three file  servers contain confidential data located in shared folders.     You need to record any failed attempts made by the consultants to access the confidential data.     Which two actions should you perform()

    • A、Create and link a new GPO to the SecureServers organizational unit. Configure the Audit privilege use Failure audi
    • B、Create and link a new GPO to the SecureServers organizational unit. Configure the Audit object access Failure aud
    • C、Create and link a new GPO to the SecureServers organizational unit. Configure the Deny access to this computer f
    • D、On each shared folder on the three file servers, add the three servers to the Auditing tab.  Configure the Failed Full control setting in the Auditing Entry dialog box.
    • E、On each shared folder on the three file servers, add the TempWorkers global group to the Auditing tab. Configure th

    正确答案:B,E

  • 第20题:

    What system startup file would an administrator edit for starting up miscellaneous third party applications?()

    • A、/etc/rc.net
    • B、/etc/rc.boot
    • C、/etc/rc.local
    • D、/etc/rc.tcpip

    正确答案:C

  • 第21题:

    多选题
    To save time configuring some custom network facilities, a junior administrator in your company  attempts to copy some entries from the /etc/inetd.conf file on a Solaris 8 OS server into the /etc/inetd.conf on a Solaris 10 OS server. The junior administrator is unable to determine why services do not start.  Which two commands can you run on the Solaris 10 OS server to start the services?()
    A

    inetconv -f

    B

    inetcfg -i /etc/inetd.conf

    C

    inetcfg -o /etc/inetd.conf

    D

    inetconv -f -i /etc/inetd.conf

    E

    inetconv -forceimport -o /etc/inetd.conf


    正确答案: E,A
    解析: 暂无解析

  • 第22题:

    单选题
    What command should a system administrator run after using an editor to create the /etc/tunables/nextboot file?()
    A

    ksh -n nextboot

    B

    tunsave -a -f nextboot

    C

    tuncheck -r -f nextboot

    D

    diff $(vmtune) /etc/tunables/nextboot


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    An administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following n?command failed toAn administrator attempts to create a link of /etc/db_conf to the target directory /db/v9.7/install/config. The following ?n?command failed to create the link.ln/db/v9.7/install/config /etc/db_conf. Which option should be used when re-running the command to resolve the problem?()
    A

    -s flag to create a soft link

    B

    -n flag to force create a hard link

    C

    -N flag to force create a hard link

    D

    -S flag to force create a soft link


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    You are designing a strategy to address the requirements of the advertising department.  What should you do? ()
    A

     Create a GPO and link it to the Denver site.

    B

     Create a GPO and link it to the Advertising OU.

    C

     Create a GPO and link it to the graphicdesigninstitute.com domain.

    D

     Configure the Default Domain Policy to have the No Override option.

    E

     Use block inheritance to prevent the GPO from applying to members of the advertising department.


    正确答案: B
    解析: 暂无解析