单选题A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A EDITB CHMODC ATTRIBD CONVERT

题目
单选题
A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()
A

EDIT

B

CHMOD

C

ATTRIB

D

CONVERT


相似考题
更多“A user copied files from a CD and now the files can only be”相关问题
  • 第1题:

    A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()

    • A、The user copied to a read-only folder share.
    • B、The user changed the attributes of the files.
    • C、The user copied the files from the local My Documents folder.
    • D、The user moved instead of copied the files.

    正确答案:D

  • 第2题:

    When migrating files from a Windows server A to a Samba server B with the command ’net rpc share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally belong only to a Windows group (no user) will generate errors during the migration. Which option in smb.conf will force such files to be mapped to the correct UNIX UID and GID?()

    • A、 use acl = yes
    • B、 map group acls = yes
    • C、 force unknown acl user = yes
    • D、 inherit acls = no

    正确答案:C

  • 第3题:

    You have a read-only tablespace on read-only media. You want to perform a media recovery on the existing data files, but using a backup control file. The backup control file indicates that the status of the read-only tablespace was read/write when the control file was backed up. What should you consider?()

    • A、 take data files from the read-only tablespace offline before performing a recovery
    • B、 recovery using backup control file is not possible, so restore all the files from the last full database backup, and then open the database
    • C、 drop the read-only tablespace and re-create the tablespace after recovery
    • D、 perform a recovery; status of the tablespace in control file will be changed automatically

    正确答案:A

  • 第4题:

    You have configured the flash recovery area to store online redo log files, control files, archived redo logs and RMAN backups. Which of the following files can you successfully delete from the flash recovery area if you want to reclaim the space within it?()

    • A、 multiplexed control files
    • B、 RMAN obsolete backups
    • C、 multiplexed online redo log files
    • D、 archived redo logs that have not been copied to tape

    正确答案:B

  • 第5题:

    You are a help desk technician for your company. All employees use Windows XP Professional computers. A salesperson named Philippe receives a removable disk drive cartridge from his supervisor. Philippe now reports that he cannot edit files on the cartridge. When he tries to open any files or folders on the cartridge, he receives an “access denied” error message. Philippe’s supervisor is currently out of the office. You place the cartridge in the removable drive on your computer. You receive the same “access denied” error message when you try to access the files and folders. You call Philippe’s supervisor. She asks you to grant permission to access the contents of the cartridge only to Philippe. However, she also wants to prevent Philippe from changing permissions on the contents of the cartridge. Which two actions should you take?()

    • A、As Administrator, take ownership of the files and folders. 
    • B、As Administrator, grant your help desk user account Allow - Full Control permission on the files and folders.
    • C、Grant Philippe Allow - Modify permission on the files and folders.
    • D、Grant Philippe Allow - Full Control permission on the files and folders.
    • E、Grant Philippe Allow - Take Ownership permission on the files and folders. 

    正确答案:A,C

  • 第6题:

    You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure user Group Policy to achieve these results:    Allow users to view the options in the Offline Files dialog box   Remove the Offline Files tab from the Folder Options dialog box   Disable the Settings button in the Offline Files Status dialog box   Remove the Settings command from the Offline Files shortcut menu    Your proposed solution is to enable the group policy setting Disable user configuration of Offline Files.    Which results does the proposed solution provide?()

    • A、Users can view the options in the Offline Files dialog box
    • B、The Offline Files tab is removed from the Folder Options dialog box
    • C、The Settings button in the Offline Files Status dialog box is disabled
    • D、The Settings command is removed from the Offline Files shortcut menu

    正确答案:B,C

  • 第7题:

    单选题
    When migrating files from a Windows server A to a Samba server B with the command ’net rpc share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally belong only to a Windows group (no user) will generate errors during the migration. Which option in smb.conf will force such files to be mapped to the correct UNIX UID and GID?()
    A

     use acl = yes

    B

     map group acls = yes

    C

     force unknown acl user = yes

    D

     inherit acls = no


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()
    A

    Instruct User1 to create a new user certificate on Computer2.

    B

    Instruct User1 to take ownership of the encrypted files on Computer2.

    C

    Instruct User1 to import the user certificate from Computer1 to Computer2.  

    D

    Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    You have configured the flash recovery area to store online redo log files, control files, archived redo logs and RMAN backups. Which of the following files can you successfully delete from the flash recovery area if you want to reclaim the space within it?()
    A

     multiplexed control files

    B

     RMAN obsolete backups

    C

     multiplexed online redo log files

    D

     archived redo logs that have not been copied to tape


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Your database operates in ARCHIVELOG mode and user/x7fmanaged consistent backups are performed every Sunday night. On Tuesday, at 9:00 a.m. the current log sequence number was 369. Also, on Tuesday you lost the data file belonging to the SYSTEM tablespace and an archivelog file (sequence number 356) that contained redo entries between 8:00 a.m. and 8:30 a.m. With reference to this scenario, what would you do to recover the database?()
    A

    restore all the data files from last Sunday’s backup, and then perform a time­based recovery

    B

    restore all the data files from last Sunday’s backup, and then perform a cancel­based recovery

    C

    restore all the data files from last Sunday’s backup, and then perform a change­based recovery

    D

    restore only data files that belong to the SYSTEM tablespace from last Sunday’s backup, and then perform a complete recovery


    正确答案: B
    解析: 暂无解析

  • 第11题:

    多选题
    You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure user Group Policy to achieve these results:    Allow users to view the options in the Offline Files dialog box   Remove the Offline Files tab from the Folder Options dialog box   Disable the Settings button in the Offline Files Status dialog box   Remove the Settings command from the Offline Files shortcut menu    Your proposed solution is to enable the group policy setting Disable user configuration of Offline Files.    Which results does the proposed solution provide?()
    A

    Users can view the options in the Offline Files dialog box

    B

    The Offline Files tab is removed from the Folder Options dialog box

    C

    The Settings button in the Offline Files Status dialog box is disabled

    D

    The Settings command is removed from the Offline Files shortcut menu


    正确答案: A,C
    解析: 暂无解析

  • 第12题:

    单选题
    A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()
    A

    The user copied to a read-only folder share.

    B

    The user changed the attributes of the files.

    C

    The user copied the files from the local My Documents folder.

    D

    The user moved instead of copied the files.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()

    • A、EDIT
    • B、CHMOD
    • C、ATTRIB
    • D、CONVERT

    正确答案:C

  • 第14题:

    Your database is running In ARCIIIVELOG mode. One of the data files, USBRDATAOI. DBF, in the users tablespace is damaged and you need to recover the file until the point of failure. The backup for the data file is available.  Which three files would be used in the user-managed recovery process performed by the database administrator (DBA)?() 

    • A、 redo logs
    • B、 control file
    • C、 temporary files of temporary tablespace
    • D、 the latest backup of only the damaged data file
    • E、 the latest backup of all the data files In the USERS tablespace

    正确答案:A,B,D

  • 第15题:

    When performing an incomplete recover of the whole database, which data files must you restore? ()

    • A、Only the damaged or lost data files.
    • B、All of the data files of the database.
    • C、Only the data files belonging to the SYSTEM tablespace.
    • D、The data files belonging to the SYSTEM tablespace and the damaged or lost data files.

    正确答案:B

  • 第16题:

    You are the administrator of a computer named Computer1 that runs Windows 7. Several users shareComputer1. The users plan to encrypt files on the computer. You need to ensure that you can access allencrypted files on the computer.  What should you do first?()

    • A、At a command prompt, run Cipher.exe.
    • B、At a command prompt, run Certutil.exe.
    • C、From the local computer policy, modify the User Rights Assignment.
    • D、From User Accounts, run the Manage your file encryption certificates wizard.

    正确答案:A

  • 第17题:

    You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key andcertificate. You need to ensure that your user account can decrypt all EFS files on the  computer.  Whatshould you do?( )

    • A、From Credential Manager, add a Windows credential.
    • B、From Credential Manager, add a certificate-based credential.
    • C、From the local computer policy, add a data recovery agent.
    • D、From the local computer policy, modify the Restore files and directories setting.

    正确答案:C

  • 第18题:

    单选题
    Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()
    A

    Add the list of files to /etc/exclude.rootvg.

    B

    Modify the image.data file and add the files to be excluded form the backup.

    C

    Modify the bosinst.data file and specify which files are to be excluded from the backup.

    D

    Specify the files to be excluded on the command line when executing the mksysb command.


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    You are the network administrator for TestKing. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. A member server named TestkingA has a locally attached tape device. TestkingA contains several folders and files that are encrypted by using Encrypting File System (EFS). You create a new user account for a new employee named Victoria. Victoria's user account is member of the Users group only. You need to ensure that Victoria can back up the encrypted folders and files on TestkingA. Victoria must be assigned the minimum administrative privileges needed to complete this task. What should you do?()
    A

    Add Victoria's domain user account to the Administrators group.

    B

    Add Victoria's user account to the Backup Operators group.

    C

    Assign the Allow - Full Control permission on the encrypted folders and files to Victoria.

    D

    Designate Victoria as a recovery agent for the encrypted files.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    How can permissions be set up on /tmp so that a user cannot delete another user’s files?()
    A

    chmod +s /tmp

    B

    chmod 775 /tmp

    C

    chmod 1777 /tmp

    D

    chmod 4755 /tmp


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements correctly describe the relation between a data file and the logical databasestructures()
    A

    An extent cannot spread across data files.

    B

    A segment cannot spread across data files.

    C

    A data file can belong to only one tablespace.

    D

    A data file can have only one segment created in it.

    E

    A data block can spread across multiple data files as it can consist of multiple operating system (OS) blocks.


    正确答案: D,E
    解析: 暂无解析

  • 第22题:

    多选题
    You are working on a database that must be functioning 24 hours a day, 7 days a week. The databaseis configured in ARCHIVELOG mode.  Which two options do you have for performing user-managed backups()
    A

    You can perform consistent backups only.

    B

    You can perform a complete database backup without shutting down the database instance.

    C

    You can back up data files only when all data files have the same SCN recorded in the control file.

    D

    You can back up only those data files whose headers are frozen by using ALTER TABLESPACE BEGINBACKUP or ALTER DATABASE BEGIN BACKUP commands.


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    单选题
    Saul needs access to files that are in the Accounting folder on his computer. A local group named accounting is granted full control permission to the accounting folder and the files within it. Saul is a member of the accounting local group but he cannot access the files that he needs.  What should you do?()
    A

    Grant Saul NTFS permission so that he can access any parent folder or files in the shared sales folder.

    B

    Share the Sales folder and grant Saul shared folder permission to access the shared sales folder.

    C

    Remove Saul from any other groups that have been explicitly denied access to the accounting folder.

    D

    Delete the Sales local group and recreate, add individual user accounts from the sales department back into sales local group.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()
    A

    Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. 

    B

    Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. 

    C

    Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. 

    D

    Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files. 


    正确答案: D
    解析: 暂无解析