多选题Which of the following is true about the following share access properties? ()A+managers will be resolved as a Winbind group.BThe timo and taki users can manipulate files regardless of the file system permissions.C+managers will be resolved as a Unix g

题目
多选题
Which of the following is true about the following share access properties? ()
A

+managers will be resolved as a Winbind group.

B

The timo and taki users can manipulate files regardless of the file system permissions.

C

+managers will be resolved as a Unix group.

D

+managers is a builtin default Samba group.

E

The admin users can be applied only to print shares.


相似考题
更多“多选题Which of the following is true about the following share access properties? ()A+managers will be resolved as a Winbind group.BThe timo and taki users can manipulate files regardless of the file system permissions.C+managers will be resolved as a Unix g”相关问题
  • 第1题:

    Which of the following tools restricts device installation?()

    • A、Default domain policy
    • B、Group Policy
    • C、Disk Management
    • D、File share properties

    正确答案:B

  • 第2题:

    Which of the following statements is TRUE about the primary system dump device?()

    • A、 It is shared. 
    • B、 It must be /dev/hd6. 
    • C、 It must be an internal disk. 
    • D、 It can be an external device.

    正确答案:D

  • 第3题:

    Users in an office routinely work with large graphics files. Which of the following preventivemaintenance tools can assist in maintaining system performance?()

    • A、FPROT
    • B、DEFRAG
    • C、CHKDSK
    • D、SFC

    正确答案:B

  • 第4题:

    The ‘fsck -p /dev/lv00’ command returned the following message:Not a recognized filesystem type. What is the likely cause of the problem and how should it be resolved?()

    • A、The file system superblock is dirty. It can be replaced from the VGDA
    • B、The logical volume superblock is dirty. It can be replaced from the VGDA
    • C、The file system superblock is dirty. It can be replaced from the secondary copy
    • D、The logical volume superblock is dirty. It can be replaced from the secondary copy

    正确答案:C

  • 第5题:

    You Execute the Following command to create a password file in the database server: $ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’ Which two statements are true about the password file?()

    • A、It records the usernames and passwords of users when granted the DBA role.
    • B、It contains the usernames and passwords of users for whom auditing is enabled.
    • C、Is used by Oracle to authenticate users for remote database administration.
    • D、It records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.
    • E、It supports the SYSBACKUP, SYSDG, and SYSKM system privileges.

    正确答案:C,E

  • 第6题:

    Which statement is true regarding the retention policy for the incidents accumulated in the Automatic Diagnostic Repository (ADR)?()  

    • A、 The incident metadata is purged when the problem is resolved and the DBA closes the SR
    • B、 The incident files and dumps are not retained in the ADR for the manually created incidents 
    • C、 The incident files are retained but the incident metadata is purged when the problem is resolved and the DBA closes the SR
    • D、 The default setting is for one year after which the incident metadata is purged from the ADR and the files are retained for one month

    正确答案:D

  • 第7题:

    Which two statements about Automatic Storage Management (ASM) are true?()

    • A、ASM provides mirroring on file by file basis.
    • B、ASM provides automatic load balancing across all ASM disks.
    • C、ASM supports the Oracle database and operating system files.
    • D、ASM can be used to store trace files, alert log files, and the server parameter file (SPFILE).

    正确答案:A,B

  • 第8题:

    You have created a password file using the following command:   ORAPWD file=d:/oracle/ora9i/orapwU01 password=change_on_install entries=3   Which of the following is true about this password file?()

    • A、 If the REMOTE_LOGIN_PASSWORDFILE parameter is set to SHARED in the initialization parameter file, then a maximum of three users can be granted the SYSDBA or SYSOPER privileges.
    • B、 If the REMOTE_LOGIN_PASSWORDFILE parameter is set to EXCLUSIVE in the initialization parameter file, then a maximum of three users can be granted the SYSDBA or SYSOPER privileges.
    • C、 If the REMOTE_LOGIN_PASSWORDFILE parameter is set to SHARED in the initialization parameter file, then the SYSDBA and SYSOPER privileges can be granted to other users as long as space in the password file is
    • D、 If the REMOTE_LOGIN_PASSWORDFILE parameter is set to EXCLUSIVE in the initialization parameter file, then the SYSDBAand SYSOPER privileges can be granted to other users as long as space in the password file is available.

    正确答案:D

  • 第9题:

    You configure a new file server that runs Windows Server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files. The TCP/IP properties for the file server are configured as shown in the following exhibit.(exhibit not there again wtf!) You need to ensure that users are able to access the shared files. How should you configure the TCP/IP properties in the file server?()

    • A、Configure a static IP address
    • B、Configure the default gateway
    • C、Configure the DNS server address
    • D、Add the domain to the DNS suffix on the network interface

    正确答案:A

  • 第10题:

    多选题
    Which two statements about Automatic Storage Management (ASM) are true?()
    A

    ASM provides mirroring on file by file basis.

    B

    ASM provides automatic load balancing across all ASM disks.

    C

    ASM supports the Oracle database and operating system files.

    D

    ASM can be used to store trace files, alert log files, and the server parameter file (SPFILE).


    正确答案: D,C
    解析: 暂无解析

  • 第11题:

    单选题
    The ‘fsck -p /dev/lv00’ command returned the following message:Not a recognized filesystem type. What is the likely cause of the problem and how should it be resolved?()
    A

    The file system superblock is dirty. It can be replaced from the VGDA

    B

    The logical volume superblock is dirty. It can be replaced from the VGDA

    C

    The file system superblock is dirty. It can be replaced from the secondary copy

    D

    The logical volume superblock is dirty. It can be replaced from the secondary copy


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    Which of the following are contained in a store archive?()
    A

    a JAR file containing commands and JSPs

    B

    an XML file defining the content of the store archive

    C

    a ZIP file of Java properties files containing translated text

    D

    a database backup file used to define store data

    E

    a number of ZIP files used to define store data


    正确答案: B,C,E
    解析: 暂无解析

  • 第13题:

    Which of the following allows users to recover their deleted files on file shares by themselves?()

    • A、Windows restore
    • B、Windows backup
    • C、Shadow copies
    • D、Shadow backup

    正确答案:C

  • 第14题:

    A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()

    • A、Modify
    • B、Full control
    • C、Write
    • D、Read

    正确答案:D

  • 第15题:

    When making changes to a server, which of the following is the BEST way to troubleshoot a problem?()

    • A、 Perform root cause analysis and then test the theory to determine the cause.
    • B、 Make changes to the system and document everything once the problem is resolved.
    • C、 Make multiple changes to all affected areas to resolve all potential issues.
    • D、 Make a change and if the problem is not resolved, reverse the change.

    正确答案:D

  • 第16题:

    Which of the following are TRUE about a store archive?()

    • A、It is an XML file containing store data assets
    • B、It uses the same file format as a ZIP file
    • C、It contains file assets to create a store or site
    • D、It can easily be copied from one machine to another
    • E、It can contain WebSphere Commerce instance configuration information

    正确答案:B,C,D

  • 第17题:

    Which statement is true about the loss of system/x7fcritical data files in ARCHIVELOG mode?()

    • A、The data files can be recovered till the last committed transaction.
    • B、The data files can be recovered without shutting down the database.
    • C、The data file is taken offline automatically; the database remains open.
    • D、The data files can be recovered to the time of the most recent backup.

    正确答案:A

  • 第18题:

    Which statement is true regarding the retention policy for the incidents accumulated in the AutomaticDiagnostic Repository (ADR)?()

    • A、The incident metadata is purged when the problem is resolved and the DBA closes the SR
    • B、The incident files and dumps are not retained in the ADR for the manually created incidents
    • C、The incident files are retained but the incident metadata is purged when the problem is resolved and the DBA closes the SR
    • D、The default setting is for one year after which the incident metadata is purged from the ADR and the files are retained for one month

    正确答案:D

  • 第19题:

    Which statement is true about the loss of system-critical data files in ARCHIVELOG mode?()

    • A、The data files can be recovered till the last committed transaction.
    • B、The data files can be recovered without shutting down the database.
    • C、The data file is taken offline automatically; the database remains open.
    • D、The data files can be recovered to the time of the most recent backup.

    正确答案:A

  • 第20题:

    you configure a new file server that runs windows server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files.The TCP/IP properties for the file server are configured as shown in the following exhibit.You need to ensure that users are able to access the shared files. What should you do?()

    • A、Configure a static IP address.
    • B、Configure the default gateway.
    • C、Configure the DNS server address.
    • D、Add the domain to the DNS suffix on the network interface.

    正确答案:A

  • 第21题:

    多选题
    You Execute the Following command to create a password file in the database server: $ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’ Which two statements are true about the password file?()
    A

    It records the usernames and passwords of users when granted the DBA role.

    B

    It contains the usernames and passwords of users for whom auditing is enabled.

    C

    Is used by Oracle to authenticate users for remote database administration.

    D

    It records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.

    E

    It supports the SYSBACKUP, SYSDG, and SYSKM system privileges.


    正确答案: E,B
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following tools restricts device installation?()
    A

     Default domain policy

    B

     Group Policy

    C

     Disk Management

    D

     File share properties


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    Which of the following is true about the following share access properties? ()
    A

    +managers will be resolved as a Winbind group.

    B

    The timo and taki users can manipulate files regardless of the file system permissions.

    C

    +managers will be resolved as a Unix group.

    D

    +managers is a builtin default Samba group.

    E

    The admin users can be applied only to print shares.


    正确答案: A,D
    解析: 暂无解析

  • 第24题:

    多选题
    Which of the following are TRUE about a store archive?()
    A

    It is an XML file containing store data assets

    B

    It uses the same file format as a ZIP file

    C

    It contains file assets to create a store or site

    D

    It can easily be copied from one machine to another

    E

    It can contain WebSphere Commerce instance configuration information


    正确答案: C,A
    解析: 暂无解析