You have read/write permission on an ordinary file foo. You 

题目
单选题
You have read/write permission on an ordinary file foo. You have just run In foo bar. What would happen if you ran rm foo?()
A

 foo and bar would both be removed.

B

 foo would be removed while bar would remain accessible.

C

 foo would be removed, bar would still exist but would be unusable.

D

 Both foo and bar would remain accessible.

E

 You would be asked whether bar should be removed.

参考答案和解析
正确答案: E
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

To understand a word, you have to read all the letters in it; to understand a sentence you have to read all the words in it.()


正确答案:错误

第2题:

You have read/write permission on an ordinary file foo. You have just run In foo bar. What would happen if you ran rm foo?()

  • A、 foo and bar would both be removed.
  • B、 foo would be removed while bar would remain accessible.
  • C、 foo would be removed, bar would still exist but would be unusable.
  • D、 Both foo and bar would remain accessible.
  • E、 You would be asked whether bar should be removed.

正确答案:B

第3题:

You are the administrator of some of TestKing‘s file servers. Peter is hired as an intern in the human resources department. Peter needs access to some HR files. He also needs to be able to read the file named Handbook.doc, but he must not be able to make changes to it.Handbook.doc exists in a folder named HRResources. Peter needs to have Read and Modify permissions for the other files in the HRResources folder.Peter is a member of the Domain Users group and the HR group. The permissions on the HRResources folder are shown in the following table.You need to ensure that Peter can access the appropriate files and that he cannot make changes to Handbook.doc.What should you do?()

A. Set the hidden and system attributes on Handbook.Doc.

B. Disable permissions inheritance on Handbook.doc.

C. Assign Peter the Allow-Read permission for Handbook.doc.

D. Assign Peter the Deny-Write NTFS permission for Handbook.doc.


参考答案:A

第4题:

You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  You need to ensure that the application is able to load staff information from an XML file into aDataSet instance. The XML file contains an inline schema. You have to call a method of theDataSet class in order to load the information.  Identify how you can accomplish this?()

  • A、You should call the ReadXml method with the ReadSchema XML read mode.
  • B、You should call the ReadXml method with the InferTypedSchema XML read mode.
  • C、You should call the ReadXmlSchema method.
  • D、You should call the ReadXml method with the InferSchema XML read mode.

正确答案:A

第5题:

You have a read-only tablespace on read-only media. You want to perform a media recovery on the existing data files, but using a backup control file. The backup control file indicates that the status of the read-only tablespace was read/write when the control file was backed up. What should you consider?()

  • A、 take data files from the read-only tablespace offline before performing a recovery
  • B、 recovery using backup control file is not possible, so restore all the files from the last full database backup, and then open the database
  • C、 drop the read-only tablespace and re-create the tablespace after recovery
  • D、 perform a recovery; status of the tablespace in control file will be changed automatically

正确答案:A

第6题:

You have enabled backup optimization for the RMAN environment.Identify two criteria on which RMAN will skip the file, if it has already been backed up.()

  • A、The data file backup is done with multiple channels
  • B、The data files is in the read-write mode after being backed up in the read only mode
  • C、The backup was taken after the data files was taken offline-normal or is in the read only mode
  • D、The data file backup complies with the back retention policy and the backup duplexing feature

正确答案:C,D

第7题:

You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) to perform backups in your databases. Which four backup operations can be performed using RMAN?()

  • A、A backup of the target database when it is mounted
  • B、A backup of online redo log files when the database is open
  • C、A backup of only used data blocks in the file beingbeingbackup up
  • D、A backup of online, read/write data files when the database is open
  • E、A backup of only those data blocks that have changed since a previous backup
  • F、A backup of online, read/write data files when the database is in the NOMOUNT state.

正确答案:A,C,D,E

第8题:

To understand a word, you have to read all the letters in it; to understand a sentence you have to read all the words in it.()

A

B



第9题:

Your network consists of a single Active Directory domain. The domain includes a group named SalesUsers. You have a file server that runs Windows Server 2003 Service Pack 2 (SP2). The server has a folder named CorpData. You share the CorpData folder and assign the Domain Users group the Full Control share permission. In the CorpData folder, you create a folder named Sales. You need to configure security for the Sales folder to meet the following requirements: ·Members of the SalesUsers group must be able to read, create, and modify all files and folders. ·All other users must be able to view items in the folder. What should you do? ()

  • A、On the Sales folder, block permission inheritance and remove permissions. Assign the Allow - Modify permission to the SalesUsers group.
  • B、On the Sales folder, block permission inheritance and copy permissions. On the Sales folder, assign the Allow - Modify permission to the SalesUsers group.
  • C、On the CorpData share, change the share permission for Domain Users to Read. On the Sales folder, assign the Allow - Modify permissions to the SalesUsers group.
  • D、On the CorpData folder, block permission inheritance and remove permissions. In the Sales folder, assign the Allow - Modify permissions to the SalesUsers group.

正确答案:B

第10题:

You are the desktop administrator for Contoso, Ltd. The company's network contains 1,000 Windows XP Professional computers, which are members of a single Active Directory domain. The computers' hard disks are formatted as NTFS. The company's software developers release a new custom application. The application uses a .dll file named AppLib.dll, which is installed in a folder named /Program Files/Contoso/OpsApp. The company's help desk technicians report that several users experience problems when they use the application because the AppLib.dll file was deleted on their client computers. The company's software developers recommend that you modify the file permissions on AppLib.dll so that users have only Read permission on the file. You need to ensure that all users have only Read permission on the AppLib.dll file on all 1,000 Windows XP Professional computers. What should you do?() 

  • A、Write a logon script that moves the AppLib.dll file into the %systemroot%/System32 folder.
  • B、Ensure that Windows File Protection is enabled on all 1,000 Windows XP Professional computers.
  • C、Apply the logon script to all domain user accounts. 
  • D、Use the Security Configuration and Analysis console to create a new security template that modifies the file permissions on AppLib.dll. 
  • E、Use Active Directory Group Policy to import and apply the template to all 1,000 Windows XP Professional computers. 
  • F、Repackage the custom application in a Windows Installer package. 

正确答案:B

更多相关问题