File infectors are also called______viruses.A.filterB.parasailC.parasiticD.attack

题目

File infectors are also called______viruses.

A.filter

B.parasail

C.parasitic

D.attack


相似考题
参考答案和解析
正确答案:C
解析:文件传播者有时被称作寄生病毒。
更多“File infectors are also called______viruses.A.filterB.parasailC.parasiticD.attack ”相关问题
  • 第1题:

    A large corporation is concerned about the amount of time it takes to back up their main file server. They are also concerned that their IT technician frequently forgets to change the backup tapes, thereby leaving the company open to data loss. Which backup system would solve both problems?()

    • A、 RAID
    • B、 tape library
    • C、 optical storage
    • D、 disk to disk to tape

    正确答案:B

  • 第2题:

    如果要将文件名file1修改为file2,下列命令()可以实现。

    • A、cp file1file2
    • B、mv file1file2
    • C、ls file1>file2
    • D、ll file1>file2

    正确答案:B

  • 第3题:

    A hospital customer with an experienced AIX and Microsoft Windows staff wants to consolidate all of their file/print services onto fewer systems.  They currently use multiple Microsoft Windows-based Intelsystems that are experiencing reliability problems.  They also have POWER4+ systems that are running multiple AIX LPARs that have experienced no reliability issues. They need at least 99.99% uptime. Which solution will meet their uptime needs at the lowest cost?()

    • A、Combine the file/print servers onto a larger Intel-based machine (x445).
    • B、Bring up a Linux LPAR on the pSeries and run Samba to provide file/print services.
    • C、Bring up another AIX LPAR on the pSeries and run Samba to provide file/print services.
    • D、Bring up another AIX LPAR on the pSeries and run Connect Direct to provide file/print services.

    正确答案:C

  • 第4题:

    Which gets the name of the parent directory file “file.txt”?()

    • A、 String name= File.getParentName(“file.txt”);
    • B、 String name= (new File(“file.txt”)).getParent();
    • C、 String name = (new File(“file.txt”)).getParentName();
    • D、 String name= (new File(“file.txt”)).getParentFile();
    • E、 Directory dir=(new File (“file.txt”)).getParentDir();  String name= dir.getName();

    正确答案:B

  • 第5题:

    You are the desktop administrator for your company. Laura is a user in the company's accounting department. Laura uses a Windows XP Professional computer. Laura installs a new software application that was listed on her Add or Remove Programs list. Laura reports that the new application now opens whenever she double-clicks any file that has a .doc file name extension. She also reports that 24 new icons appear on the New menu when she right-clicks her desktop. Laura asks you to reconfigure her computer so that Microsoft Word opens when she double-clicks files that have a .doc file name extension. She also wants you to remove the new icons from the New menu. You instruct Laura to uninstall the new application. After she uninstalls the application, she reports that she can no longer open .doc files by double-clicking them. She also reports that the unwanted icons on the New menu are still present. You reinstall the new application, and it continues to open when Laura double-clicks .doc files. You want to restore the .doc file association and to remove the unwanted icons from the New menu on Laura's computer. You want to accomplish these tasks as quickly as possible. You also want to ensure that none of Laura's other documents or personal settings are affected. What should you do?()

    • A、Restore the computer to the restore point that was created when Laura installed the new application.
    • B、Restore the System State data to Laura's computer from a backup tape. 
    • C、Use the Windows XP Professional CD-ROM to perform an Automated System Recovery (ASR) restore. 
    • D、Restart the computer by using the last known good configuration. 

    正确答案:A

  • 第6题:

    单选题
    You are changing the security settings of a file named MyData.xml.You need to preserve the existing inherited access rules.You also need to prevent the access rules from inheriting changes in the future.   Which code segment should you use?()
    A

    A

    B

    B

    C

    C

    D

    D


    正确答案: B
    解析: 暂无解析

  • 第7题:

    单选题
    You are a database administrator for your company. The company uses a SQL Server 2005 database. A full backup of the database is made each night. Transaction log backups are made each morning and each afternoon. You notice that the database transaction log file grows very large throughout the day. You need to minimize the size of the transaction log file. You also need to minimize data loss in the event of a failure. What should you do?()
    A

    Decrease the amount of time between transaction log backups.

    B

    Configure the database to use the simple recovery model.

    C

    Configure the RECOVERY INTERVAL option to be a smaller value.

    D

    Run DBCC SHRINKFILE on the transaction log file.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    Which gets the name of the parent directory file “file.txt”?()
    A

     String name= File.getParentName(“file.txt”);

    B

     String name= (new File(“file.txt”)).getParent();

    C

     String name = (new File(“file.txt”)).getParentName();

    D

     String name= (new File(“file.txt”)).getParentFile();

    E

     Directory dir=(new File (“file.txt”)).getParentDir();  String name= dir.getName();


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    After you back up /export using a file system snapshot, and you have removed the snapshot, you also need to remove the backing store. If the snapshot was created with:  # mkdir /var/tmp/backup-snaps  # fssnap -o  bs=/var/tmp/backup-snaps /export   Which file do you need to remove? ()
    A

    A

    B

    B

    C

    C

    D

    D


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    The character mode sales report is stored on the network drive as a .REX. You need to make changes to the report layout. Using the report builder how would you change this file?()
    A

    Open the file using the menu option file->open make the changes and recompile the report. 

    B

    Convert the file into .REP file using the report compiler make the changes and convert the file back to a .REX file. 

    C

    Execute the R30CONV command to convert the file to a .RDF file, make the changes and convert the file back to a .REX file. 

    D

    Choose file -> administration->compile. Convert the file to a .REP file, make the changes and convert the file back to a .REX file. 

    E

    Execute the R30CONV command to convert the file to a .REP file, make the changes and convert the file back to a .REX file.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following statements best describes the relationship between a logical volume and a journaled file system (JFS)?()
    A

    Increasing the size of a logical volume also increases the size of the file system

    B

    Reducing the size of a logical volume requires reducing the size of the file system first

    C

    Increasing the size of a file system requires increasing the size of the logical volume first

    D

    Increasing the size of a file system also increases the size of the logical volume when necessary


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    You are the network administrator for your company. All network servers run Windows Server 2003.The network includes a file server named File1. File1 contains a single disk for system files and two SCSIhard disks that comprise a 72-GB mirrored volume with 65 GB of read-only data. Users connect to thisdata by using shortcuts on their desktops.File1 is scheduled for replacement. You have a scheduled maintenance window to complete this task.Before the maintenance window, you build a new server.You need to bring the new server online with current data and re-establish redundancy as quickly aspossible. You must also ensure that the desktop shortcuts will continue to function.What should you do? ()
    A

    Name the new server File2. Create a new mirrored volume by using two 72-GB disks. Connect File2 to the network and copy the data from File1. When copying is complete, shut down the old File1.

    B

    Name the new server File1. Move both disks from the old File1 to the new File1. Scan the disks for changes. Import the disks. Connect the new File1 to the network.

    C

    Name the new server File1. Break the mirror on the old File1. Move one of the disks from the old File1 to the new File1. Scan the disk for changes. Initialize the disk. Select the spare disk and create the mirror. Connect the new File1 to the network.

    D

    Name the new server File1. Remove one of the disks in the mirror from the old File1. Move the disk to the new File1. Scan the disk for changes. Import the disk. Shut down the old File1 and connect the new File1 to the network.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()

    • A、By using a job scheduler such as cron
    • B、By enabling automatic cluster verification
    • C、By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rc
    • D、By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods

    正确答案:A

  • 第14题:

    What is the difference between thE.remove and thE.purge action with the dpkg command?()

    • A、 -remove removes the program, -purge also removes the config files
    • B、 -remove only removes the program, -purge only removes the config files
    • C、 -remove removes a package, -purge also removes all packages dependent on it
    • D、 -remove removes only the package file itself, -purge removes all files related to the package

    正确答案:A

  • 第15题:

    Which of the following will occur if an operator types the command vi file.out?()

    • A、If the file exists it will be opened for editing. If the file does not exist an error message will be displayed.
    • B、If the file exists it will be opened for editing. If the file does not exist a new file with the name file.out will be created and opened for editing.
    • C、If the file exists an error message will be displayed. If the file does not exist a new file with the name file.out will be created and opened for editing.
    • D、If the file exists the operator will be asked whether to open the file or overwrite the file. If the file does not exist a new file with the name file.out will be created and opened for editing.

    正确答案:B

  • 第16题:

    Your network consists of a single Active Directory domain. All network servers run Windows Server2003 Service Pack 2 (SP2).Your organization has a storage area network (SAN). All shared folders on file servers are stored on theSAN.The Change permission for all shared folders is assigned to Domain Users. Different NTFS permissionsare also applied to the shared folders.You perform a daily full backup of all the files stored in the shared folders.A file server fails and requires several hours to repair.You need to provide users access to the shared folders that were on the failed file server as quickly aspossible. Existing permissions must be retained for all files.What should you do? ()

    • A、Attach an existing file server to the SAN storage locations. Configure the shared folders on the server.
    • B、Attach an existing file server to the SAN storage locations. Configure NTFS permissions for the folders.
    • C、On an existing file server, restore the data from the tape backup. Configure NTFS permissions for the folders.
    • D、On an existing file server, restore the data from the tape backup. Configure the shared folders on the server.

    正确答案:A

  • 第17题:

    You delete content from a file named Speed.doc that is stored in the C:///Data folder. You edit 20 files in this folder over the next two days.  You need to restore the version of the file that had the correct data. You also need to ensure that the other files in the folder remain unaffected.  What should you do? ()

    • A、From the Previous Versions tab, restore the version of the file that contains the correct data.
    • B、Restore a version of the folder that contains the correct version of the file.
    • C、Open a version of the folder that contains the correct version of the file.
    • D、Copy a version of the folder that contains the correct version of the file. Replace the existing version of the folder with the older version.

    正确答案:A

  • 第18题:

    单选题
    What is the difference between thE.remove and thE.purge action with the dpkg command?()
    A

     -remove removes the program, -purge also removes the config files

    B

     -remove only removes the program, -purge only removes the config files

    C

     -remove removes a package, -purge also removes all packages dependent on it

    D

     -remove removes only the package file itself, -purge removes all files related to the package


    正确答案: A
    解析: 暂无解析

  • 第19题:

    多选题
    A corrupted file system is now repaired and back in use. Some, but not all of the files within the file  systems have been deleted. The only backup of this file system is a month-old tar archive. This archive will need to be restored as root.  Which two statements correctly describe the effects of the restore operation?()
    A

    Files found in the file system that are also on tape will NOT be overwritten.

    B

    The missing files, present on the backup tape, are restored to the file system with the data as it was when the backup was taken.

    C

    The access times are preserved by tar and will reflect the time when a user last accessed the data.

    D

    The modification time on the files restored by tar will be preserved and will reflect the time the file was last modified before the backup, NOT the time of the restore operation.


    正确答案: B,D
    解析: 暂无解析

  • 第20题:

    单选题
    A large corporation is concerned about the amount of time it takes to back up their main file server. They are also concerned that their IT technician frequently forgets to change the backup tapes, thereby leaving the company open to data loss. Which backup system would solve both problems?()
    A

     RAID

    B

     tape library

    C

     optical storage

    D

     disk to disk to tape


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following will occur if an operator types the command vi file.out?()
    A

    If the file exists it will be opened for editing. If the file does not exist an error message will be displayed.

    B

    If the file exists it will be opened for editing. If the file does not exist a new file with the name file.out will be created and opened for editing.

    C

    If the file exists an error message will be displayed. If the file does not exist a new file with the name file.out will be created and opened for editing.

    D

    If the file exists the operator will be asked whether to open the file or overwrite the file. If the file does not exist a new file with the name file.out will be created and opened for editing.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    RMAN automatically propagate information about the database structure, archived redo logs, backup sets, and data file copies into the recovery catalog from the target database’s control file. This information can also be propagated to the catalog manually by using the ()command.
    A

    LIST

    B

    SWITCH

    C

    VALIDATE

    D

    CONFIGURE

    E

    RESYNC CATALOG

    F

    UPGRADE CATALOG


    正确答案: F
    解析: 暂无解析

  • 第23题:

    单选题
    An administrator has written a script to check that the contents of an application configuration file are identicalon all cluster nodes. The script has also been associated with a user defined custom verification method. Theadministrator would like the contents of this file to be checked and verified automatically on a daily basis.How can this be achieved?()
    A

    By using a job scheduler such as cron

    B

    By enabling automatic cluster verification

    C

    By including the script name in the file /usr/es/sbin/cluster/etc/clverify.rc

    D

    By including the custom method name in the file /usr/es/sbin/cluster/etc/rc.authomethods


    正确答案: C
    解析: 暂无解析