+managers will be resolved as a Winbind group.
The timo and taki users can manipulate files regardless of the file system permissions.
+managers will be resolved as a Unix group.
+managers is a builtin default Samba group.
The admin users can be applied only to print shares.
第1题:
Which of the following tools restricts device installation?()
第2题:
Which of the following statements is TRUE about the primary system dump device?()
第3题:
Users in an office routinely work with large graphics files. Which of the following preventivemaintenance tools can assist in maintaining system performance?()
第4题:
The ‘fsck -p /dev/lv00’ command returned the following message:Not a recognized filesystem type. What is the likely cause of the problem and how should it be resolved?()
第5题:
You Execute the Following command to create a password file in the database server: $ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’ Which two statements are true about the password file?()
第6题:
Which statement is true regarding the retention policy for the incidents accumulated in the Automatic Diagnostic Repository (ADR)?()
第7题:
Which two statements about Automatic Storage Management (ASM) are true?()
第8题:
You have created a password file using the following command: ORAPWD file=d:/oracle/ora9i/orapwU01 password=change_on_install entries=3 Which of the following is true about this password file?()
第9题:
You configure a new file server that runs Windows Server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files. The TCP/IP properties for the file server are configured as shown in the following exhibit.(exhibit not there again wtf!) You need to ensure that users are able to access the shared files. How should you configure the TCP/IP properties in the file server?()
第10题:
ASM provides mirroring on file by file basis.
ASM provides automatic load balancing across all ASM disks.
ASM supports the Oracle database and operating system files.
ASM can be used to store trace files, alert log files, and the server parameter file (SPFILE).
第11题:
The file system superblock is dirty. It can be replaced from the VGDA
The logical volume superblock is dirty. It can be replaced from the VGDA
The file system superblock is dirty. It can be replaced from the secondary copy
The logical volume superblock is dirty. It can be replaced from the secondary copy
第12题:
It is an XML file containing store data assets
It uses the same file format as a ZIP file
It contains file assets to create a store or site
It can easily be copied from one machine to another
It can contain WebSphere Commerce instance configuration information
第13题:
Which of the following allows users to recover their deleted files on file shares by themselves?()
第14题:
A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()
第15题:
When making changes to a server, which of the following is the BEST way to troubleshoot a problem?()
第16题:
Which of the following are TRUE about a store archive?()
第17题:
Which statement is true about the loss of system/x7fcritical data files in ARCHIVELOG mode?()
第18题:
Which statement is true regarding the retention policy for the incidents accumulated in the AutomaticDiagnostic Repository (ADR)?()
第19题:
Which statement is true about the loss of system-critical data files in ARCHIVELOG mode?()
第20题:
you configure a new file server that runs windows server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files.The TCP/IP properties for the file server are configured as shown in the following exhibit.You need to ensure that users are able to access the shared files. What should you do?()
第21题:
It records the usernames and passwords of users when granted the DBA role.
It contains the usernames and passwords of users for whom auditing is enabled.
Is used by Oracle to authenticate users for remote database administration.
It records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.
It supports the SYSBACKUP, SYSDG, and SYSKM system privileges.
第22题:
Default domain policy
Group Policy
Disk Management
File share properties
第23题:
a JAR file containing commands and JSPs
an XML file defining the content of the store archive
a ZIP file of Java properties files containing translated text
a database backup file used to define store data
a number of ZIP files used to define store data