A system administrator has edited the necessary files for se

题目
单选题
A system administrator has edited the necessary files for setup of an AIX system to serve as a bootp server.  Which of the following commands is required to complete the activation?()
A

telinit -q

B

startsrc -s bootpd

C

refresh -s inetd

参考答案和解析
正确答案: C
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?()

  • A、An IEEE-1394 device
  • B、A NIC device
  • C、An IrDA device
  • D、A FDD device

正确答案:A

第2题:

A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface.  Which of the following files would show the commands that have been performed from within smit and their resulting output()

  • A、/smit.log
  • B、/smit.script
  • C、/var/log/smit.log
  • D、/.history

正确答案:A

第3题:

You are a network administrator for Ezonexam.com's Windows 2000 network.

Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

What should you do?

A.Use System File Checker (SFC) to decrypt the file.

B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

C.Log on the network as the administrator. Use the cipher command to decrypt the files.

D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


正确答案:B
解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

Incorrect answers:
A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

第4题:

A System p administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect.  Which of the following commands can be used to determine the block size of the backup tape ()

  • A、dd
  • B、tar
  • C、cpio
  • D、restore

正确答案:A

第5题:

An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()

  • A、odmget
  • B、odmadd
  • C、odmshow
  • D、odmcreate

正确答案:A

第6题:

A system administrator has edited the necessary files for setup of an AIX system to serve as a bootp server.  Which of the following commands is required to complete the activation?()

  • A、telinit -q
  • B、startsrc -s bootpd
  • C、refresh -s inetd

正确答案:C

第7题:

Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()

  • A、/etc/security/user
  • B、/etc/services
  • C、/etc/inetd.conf
  • D、/etc/hosts.equiv

正确答案:C

第8题:

A system administrator has just applied an update to an AIX system to correct a problem, The APAR number is IX49035 and was shipped as part of the PTF number U437542. After applying the APAR fix, the administrator wants to ensure that the fix is applied before informing the system users of the corrected problem. Which of the following commands should the system administrator run to verify that the APAR fix has been applied to the system?()

A.lslpp -f IX49035

B.lslpp -fB U437542

C.instfix -f IX49035

D.instfix -ik IX49035


参考答案:D

第9题:

An administrator is planning an upgrade of a major software package on an application server.The software has been tested successfully in a test environment and it is ready to go into production. Which of the following steps should the administrator take next?()

  • A、Identify necessary operating system updates
  • B、Implement the change
  • C、Document the change
  • D、Schedule system down time

正确答案:D

第10题:

A new application has been added to a system which needs to automatically be started at system startup. The system administrator has decided to accomplish this by using the /etc/inittab file. Which command would be used to accomplish this in a supported manner?()

  • A、vi
  • B、mkitab
  • C、telinit
  • D、startsrc

正确答案:B

更多相关问题