How are the commands a user is allowed to enter defined in JUNOS?()A、Permissions are configured individually for each user.B、Users are associated with user classes, and each class defines the permissions for entering commands.C、There are four default clas

题目

How are the commands a user is allowed to enter defined in JUNOS?()

  • A、Permissions are configured individually for each user.
  • B、Users are associated with user classes, and each class defines the permissions for entering commands.
  • C、There are four default classes with different permissions and you can only use these four.
  • D、Permissions are associated with each user ID

相似考题
参考答案和解析
正确答案:B
更多“How are the commands a user is a”相关问题
  • 第1题:

    Kerberos is a form of user authentication that:()

    A. Provides users access to network resources.

    B. Performs router commands after user authentication.

    C. Provides users with remote access only capabilities.

    D. Does not require an authentication server


    参考答案:A

  • 第2题:

    The ______ controls the cursor or pointer on the screen and allows the user to access commands by pointing and clicking.

    A.graphics

    B.printer

    C.program

    D.mouse


    正确答案:D
    解析:译文的含义是:()控制屏幕上的光标或指针,使得用户可通过指向和单击来访问命令。选项A、B、C、D的含义分别是图形、打印机、程序、鼠标。选项D符合题意,为所选。

  • 第3题:

    The following entry is in the /etc/host.equiv and /home/jsmith/.rhosts file on server Alpha:+ jsmith.What does this entry indicate?()

    • A、The user "jsmith" can use r-commands from any server to server Alpha system-wide
    • B、The user "jsmith" can use r-commands from server Alpha to any server system-wide
    • C、The user "jsmith" can use r-commands from server Alpha to any server with a /home/jsmith directory
    • D、The user "jsmith" can use r-commands from any server to server Alpha only in the /home/jsmith directory

    正确答案:A

  • 第4题:

    An administrator needs to know the workstation name of a user who called in for support in orderto remotely manage it. After calling the user and having the user open a command prompt, whichof the following commands would the administrator ask the user to type?()

    • A、Netstat
    • B、Ifconfig
    • C、Hostname
    • D、Ping

    正确答案:C

  • 第5题:

    Kerberos is a form of user authentication that:()

    • A、Provides users access to network resources.
    • B、Performs router commands after user authentication.
    • C、Provides users with remote access only capabilities.
    • D、Does not require an authentication server

    正确答案:A

  • 第6题:

    A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh  commands by the root user return with a permission error message. What action will resolve the problem?()

    • A、Add root user to the /etc/hosts.equiv on serverB .
    • B、Create $HOME/.rhosts file for the root user on serverB .
    • C、Restart the rshd daemon with root enabled option on serverB .
    • D、Add entry to allow root user from serverA to the /etc/hosts.allow on serverB .

    正确答案:D

  • 第7题:

    Which two commands will successfully create ping traffic?()

    • A、user@router# ping 10.10.10.1
    • B、user@router# run ping 10.10.10.1
    • C、user@router> ping 10.10.10.1
    • D、user@router> request ping 10.10.10.1

    正确答案:B,C

  • 第8题:

    单选题
    You are ready to implement RMAN in the backup and recover strategy for your company. Which system privilege must the RMAN user have to be able to connect and execute RMAN commands on a target database?()
    A

    SYSDBA

    B

    SYSOPER

    C

    No system privileges are required for the RMAN user.

    D

    Only SYS user can connect and execute RMAN commands on a target database.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    The following entry is in the /etc/host.equiv and /home/jsmith/.rhosts file on server Alpha:+ jsmith.What does this entry indicate?()
    A

    The user jsmith can use r-commands from any server to server Alpha system-wide

    B

    The user jsmith can use r-commands from server Alpha to any server system-wide

    C

    The user jsmith can use r-commands from server Alpha to any server with a /home/jsmith directory

    D

    The user jsmith can use r-commands from any server to server Alpha only in the /home/jsmith directory


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following commands will allow a user to discover their IP address, subnet, and DNS?()
    A

    IPCONFIG

    B

    NETSTAT -A

    C

    NSLOOKUP

    D

    IPCONFIG /ALL


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Given the following output:  prompt> myapp   [1]+ Stopped myapp  prompt>   Which of the following commands will resume executing the stopped process while allowing the user to continue to type commands at the command prompt?()
    A

     bg myapp

    B

     continue myapp

    C

     exec myapp

    D

     fg myapp

    E

     myapp &


    正确答案: B
    解析: 暂无解析

  • 第12题:

    问答题
    how many neighbor commands required for establish ibgp peers in 4 routers?

    正确答案: If using IBGP full-mesh to establish IBGP peer and no update-source is specified, 12 neighbor command is need.
    If RR is used,it could be 8 command using for ibgp establishing when there are 1 RR,2 client and 1 nonclient and no update-source is specified.
    解析: 暂无解析

  • 第13题:

    A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with apermission error message.What action will resolve the problem?()

    A.Add root user to the /etc/hosts.equiv on serverB

    B.Create $HOME/.rhosts file for the root user on serverB

    C.Restart the rshd daemon with root enabled option on serverB

    D.Add entry to allow root user from serverA to the /etc/hosts.allow on serverB


    参考答案:D

  • 第14题:

    how many neighbor commands required for establish ibgp peers in 4 routers?


    正确答案: If using IBGP full-mesh to establish IBGP peer and no update-source is specified, 12 neighbor command is need.
    If RR is used,it could be 8 command using for ibgp establishing when there are 1 RR,2 client and 1 nonclient and no update-source is specified.

  • 第15题:

    Nexus# conf t  Enter configuration commands, one per line. End with CNTL/Z.  Nexus(config)# interface Loopback10  % Permission denied  Nexus(config)# ?  no Negate a command or set its defaults  username Configure user information.  end Go to exec mode  exit Exit from command interpreter  What is the reason why this user is not able to enter configuration commands?()

    • A、 The user did not enter enable prior to going into configuration mode.
    • B、 The software license installed on Nexus is Layer 2 only, which does not allow the creation of Layer 3 interfaces.
    • C、 The user RBAC role is set to network-operator.
    • D、 The user failed authentication and user access defaulted to read-only mode.
    • E、 The AAA server is currently not responding.

    正确答案:C

  • 第16题:

    Given the following output:  prompt> myapp   [1]+ Stopped myapp  prompt>   Which of the following commands will resume executing the stopped process while allowing the user to continue to type commands at the command prompt?()

    • A、 bg myapp
    • B、 continue myapp
    • C、 exec myapp
    • D、 fg myapp
    • E、 myapp &

    正确答案:A

  • 第17题:

    Which of the following commands will display any user defined verification methods?()

    • A、cldump
    • B、clautover v
    • C、clve c .custom v
    • D、cllscustom t verify

    正确答案:D

  • 第18题:

    A System p administrator would like to verify the user definitions in the /etc/passwd file.  Which of the following commands will accomplish this()

    • A、sysck
    • B、usrck
    • C、lssec
    • D、lsuser

    正确答案:B

  • 第19题:

    A customer has determined they want to install an IBM x445 system in their company.  They will be running a large database on the system.  In order to determine how many CPUs will be needed to attain the optimum cost-effective solution, which TWO of the following questions should be asked?()

    • A、How large is the database?
    • B、What is the expected user workload?
    • C、How is the database software licensed?
    • D、What type of user interface will be used?
    • E、How much data cache will the database be allocated?

    正确答案:A,B

  • 第20题:

    单选题
    Which process is responsible for the configuration of the router and all user commands on a Junos device?()
    A

    rpd

    B

    chassisd

    C

    dcd

    D

    mgd


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    In user-managed backup and recover procedures, how are data files backed up? ()
    A

    Using SQL commands.

    B

    Using SQL*Plus commands.

    C

    Using operating system commands.

    D

    Using Recover Manager commands.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    How are the commands a user is allowed to enter defined in JUNOS?()
    A

    Permissions are configured individually for each user.

    B

    Users are associated with user classes, and each class defines the permissions for entering commands.

    C

    There are four default classes with different permissions and you can only use these four.

    D

    Permissions are associated with each user ID


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    All the database users are presently connected to the database instance and working. The HR user hasopened three database sessions and executed the following command in one of his sessions:SQL> UPDATE persons SET ccode=’U031’ WHERE ccode=’U029’; 123 rows updated.SQL> DELETE FROM persons WHERE exp=’Y’;3 rows deleted. The SYS user opens a new session after HR executed the above commands.  Which sessions can see theeffect of the UPDATE and DELETE commands()
    A

    All sessions of the HR user only

    B

    All sessions of the HR user and the SYS user

    C

    The session of the HR user that executed the commands

    D

    All the sessions for which the database users have access privilege to the PERSONS table


    正确答案: B
    解析: 暂无解析