EDIT
CHMOD
ATTRIB
CONVERT
第1题:
A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()
第2题:
When migrating files from a Windows server A to a Samba server B with the command ’net rpc share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally belong only to a Windows group (no user) will generate errors during the migration. Which option in smb.conf will force such files to be mapped to the correct UNIX UID and GID?()
第3题:
You have a read-only tablespace on read-only media. You want to perform a media recovery on the existing data files, but using a backup control file. The backup control file indicates that the status of the read-only tablespace was read/write when the control file was backed up. What should you consider?()
第4题:
You have configured the flash recovery area to store online redo log files, control files, archived redo logs and RMAN backups. Which of the following files can you successfully delete from the flash recovery area if you want to reclaim the space within it?()
第5题:
You are a help desk technician for your company. All employees use Windows XP Professional computers. A salesperson named Philippe receives a removable disk drive cartridge from his supervisor. Philippe now reports that he cannot edit files on the cartridge. When he tries to open any files or folders on the cartridge, he receives an “access denied” error message. Philippe’s supervisor is currently out of the office. You place the cartridge in the removable drive on your computer. You receive the same “access denied” error message when you try to access the files and folders. You call Philippe’s supervisor. She asks you to grant permission to access the contents of the cartridge only to Philippe. However, she also wants to prevent Philippe from changing permissions on the contents of the cartridge. Which two actions should you take?()
第6题:
You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure user Group Policy to achieve these results: Allow users to view the options in the Offline Files dialog box Remove the Offline Files tab from the Folder Options dialog box Disable the Settings button in the Offline Files Status dialog box Remove the Settings command from the Offline Files shortcut menu Your proposed solution is to enable the group policy setting Disable user configuration of Offline Files. Which results does the proposed solution provide?()
第7题:
use acl = yes
map group acls = yes
force unknown acl user = yes
inherit acls = no
第8题:
Instruct User1 to create a new user certificate on Computer2.
Instruct User1 to take ownership of the encrypted files on Computer2.
Instruct User1 to import the user certificate from Computer1 to Computer2.
Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.
第9题:
multiplexed control files
RMAN obsolete backups
multiplexed online redo log files
archived redo logs that have not been copied to tape
第10题:
restore all the data files from last Sunday’s backup, and then perform a timebased recovery
restore all the data files from last Sunday’s backup, and then perform a cancelbased recovery
restore all the data files from last Sunday’s backup, and then perform a changebased recovery
restore only data files that belong to the SYSTEM tablespace from last Sunday’s backup, and then perform a complete recovery
第11题:
Users can view the options in the Offline Files dialog box
The Offline Files tab is removed from the Folder Options dialog box
The Settings button in the Offline Files Status dialog box is disabled
The Settings command is removed from the Offline Files shortcut menu
第12题:
The user copied to a read-only folder share.
The user changed the attributes of the files.
The user copied the files from the local My Documents folder.
The user moved instead of copied the files.
第13题:
A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()
第14题:
Your database is running In ARCIIIVELOG mode. One of the data files, USBRDATAOI. DBF, in the users tablespace is damaged and you need to recover the file until the point of failure. The backup for the data file is available. Which three files would be used in the user-managed recovery process performed by the database administrator (DBA)?()
第15题:
When performing an incomplete recover of the whole database, which data files must you restore? ()
第16题:
You are the administrator of a computer named Computer1 that runs Windows 7. Several users shareComputer1. The users plan to encrypt files on the computer. You need to ensure that you can access allencrypted files on the computer. What should you do first?()
第17题:
You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key andcertificate. You need to ensure that your user account can decrypt all EFS files on the computer. Whatshould you do?( )
第18题:
Add the list of files to /etc/exclude.rootvg.
Modify the image.data file and add the files to be excluded form the backup.
Modify the bosinst.data file and specify which files are to be excluded from the backup.
Specify the files to be excluded on the command line when executing the mksysb command.
第19题:
Add Victoria's domain user account to the Administrators group.
Add Victoria's user account to the Backup Operators group.
Assign the Allow - Full Control permission on the encrypted folders and files to Victoria.
Designate Victoria as a recovery agent for the encrypted files.
第20题:
chmod +s /tmp
chmod 775 /tmp
chmod 1777 /tmp
chmod 4755 /tmp
第21题:
An extent cannot spread across data files.
A segment cannot spread across data files.
A data file can belong to only one tablespace.
A data file can have only one segment created in it.
A data block can spread across multiple data files as it can consist of multiple operating system (OS) blocks.
第22题:
You can perform consistent backups only.
You can perform a complete database backup without shutting down the database instance.
You can back up data files only when all data files have the same SCN recorded in the control file.
You can back up only those data files whose headers are frozen by using ALTER TABLESPACE BEGINBACKUP or ALTER DATABASE BEGIN BACKUP commands.
第23题:
Grant Saul NTFS permission so that he can access any parent folder or files in the shared sales folder.
Share the Sales folder and grant Saul shared folder permission to access the shared sales folder.
Remove Saul from any other groups that have been explicitly denied access to the accounting folder.
Delete the Sales local group and recreate, add individual user accounts from the sales department back into sales local group.
第24题:
Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*.
Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files.
Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files.
Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files.