How are the commands a user is allowed to enter defined in JUNOS?()
第1题:
A. Provides users access to network resources.
B. Performs router commands after user authentication.
C. Provides users with remote access only capabilities.
D. Does not require an authentication server
第2题:
The ______ controls the cursor or pointer on the screen and allows the user to access commands by pointing and clicking.
A.graphics
B.printer
C.program
D.mouse
第3题:
The following entry is in the /etc/host.equiv and /home/jsmith/.rhosts file on server Alpha:+ jsmith.What does this entry indicate?()
第4题:
An administrator needs to know the workstation name of a user who called in for support in orderto remotely manage it. After calling the user and having the user open a command prompt, whichof the following commands would the administrator ask the user to type?()
第5题:
Kerberos is a form of user authentication that:()
第6题:
A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with a permission error message. What action will resolve the problem?()
第7题:
Which two commands will successfully create ping traffic?()
第8题:
SYSDBA
SYSOPER
No system privileges are required for the RMAN user.
Only SYS user can connect and execute RMAN commands on a target database.
第9题:
The user jsmith can use r-commands from any server to server Alpha system-wide
The user jsmith can use r-commands from server Alpha to any server system-wide
The user jsmith can use r-commands from server Alpha to any server with a /home/jsmith directory
The user jsmith can use r-commands from any server to server Alpha only in the /home/jsmith directory
第10题:
IPCONFIG
NETSTAT -A
NSLOOKUP
IPCONFIG /ALL
第11题:
bg myapp
continue myapp
exec myapp
fg myapp
myapp &
第12题:
第13题:
A.Add root user to the /etc/hosts.equiv on serverB
B.Create $HOME/.rhosts file for the root user on serverB
C.Restart the rshd daemon with root enabled option on serverB
D.Add entry to allow root user from serverA to the /etc/hosts.allow on serverB
第14题:
how many neighbor commands required for establish ibgp peers in 4 routers?
第15题:
Nexus# conf t Enter configuration commands, one per line. End with CNTL/Z. Nexus(config)# interface Loopback10 % Permission denied Nexus(config)# ? no Negate a command or set its defaults username Configure user information. end Go to exec mode exit Exit from command interpreter What is the reason why this user is not able to enter configuration commands?()
第16题:
Given the following output: prompt> myapp [1]+ Stopped myapp prompt> Which of the following commands will resume executing the stopped process while allowing the user to continue to type commands at the command prompt?()
第17题:
Which of the following commands will display any user defined verification methods?()
第18题:
A System p administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this()
第19题:
A customer has determined they want to install an IBM x445 system in their company. They will be running a large database on the system. In order to determine how many CPUs will be needed to attain the optimum cost-effective solution, which TWO of the following questions should be asked?()
第20题:
rpd
chassisd
dcd
mgd
第21题:
Using SQL commands.
Using SQL*Plus commands.
Using operating system commands.
Using Recover Manager commands.
第22题:
Permissions are configured individually for each user.
Users are associated with user classes, and each class defines the permissions for entering commands.
There are four default classes with different permissions and you can only use these four.
Permissions are associated with each user ID
第23题:
All sessions of the HR user only
All sessions of the HR user and the SYS user
The session of the HR user that executed the commands
All the sessions for which the database users have access privilege to the PERSONS table