题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-11-28 06:26:53

[单项选择]With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()
A. IETF
B. PFC
C. TCAM
D. ASIC

更多"With respect to a computer file sys"的相关试题:

[单项选择]The computer system can help firefighters by giving medical information about ______ living in a burning building.
A. dwellers
B. residents
C. clients
D. invalids
[单项选择]When an organization acquires a computer system, it decides precisely what forms of input would be most {{U}}favorable{{/U}}.
A. inexpressive
B. beneficial
C. defensive
D. essential
[单项选择]

Passage Two Clifford Stoll ran a computer system in Berkeley, California. As a system administrator, he kept a close eye on the records. One day, Stoll found something strange in the payment record. There was a 75 cents mistake. One of the thousands of users had used the system for 75 cents worth of time and not paid for it. It might sound like very little money to worry about. But that 75 cents was the first clue Stoll had to a much bigger problem--that a hacker had broken into Stoll’ s computer system. Who was it Stoll spent the next year trying to find out. During that time the hacker used the system in Berkeley as a starting point to break into military computer systems all over the United States. Stoll had to keep track of the hacker’s activities on the computer without the hacker’ s knowing someone was watching him. Stoll even made up huge files of false information so the hacker would have lots to read. When the hacker spent long time reading, the
A. the telephone company cut all the telephone lines
B. the police stored false information in Stoll' s computer system
C. Stoll told the police everything he knew
D. Stoll spent lots of time and efforts

[单项选择]He's responsible()the central computer system.
A. in
B. for
C. of
[单项选择]There is a computer system ______ the company is experiencing problems.
A. with which
B. as which
C. such as
D. for such
[单项选择]A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()
A. Set the group’s folder permissions to deny.
B. Use Event Viewer to monitor changes to the file.
C. Store a backup copy of the file on a USB drive.
D. Change the file attribute to read only.
[单项选择] A user is reporting that access to a file server is much slower than it has been. The system administrator completes a test of the server using a system monitoring tool and compares it to the previously taken baseline. The comparison shows that there are no significant changes in the use of system resources. Which of the following actions should be taken to resolve this user problem?()
A. Add additional RAM to the user PC
B. Troubleshoot the user PC
C. Add additional RAM to the server
D. Add additional hard drive space to the server
[单项选择]The ZXMP M600 system has()options in respect of power supply.
A. 1
B. 2
C. 3
D. 4
[单项选择] Your network contains a Distributed File System (DFS) target folder named Folder1 that contains 100 GB of data. You plan to create a new DFS replica of Folder1 on a server named Server2. You need to prestage the data in Folder1 on Server2. The solution must ensure that the amount of initial DFS replication traffic is minimized. Which tool should you use to prestage the Folder1 data?()
A. Dfscmd
B. Dfsrmig
C. Dfsutil
D. Wbadmin
[单项选择] While attempting to expand a file system, an administrator receives an error message indicating that the filesystem is not recognized. Running the 'lsfs' command fails to display any output, but the 'df' command is working and displays normal filesystems. What is the likely cause of the problem?()
A. The /etc/filesystems file is missing.
B. The /dev/hd8 logical volume is corrupt.
C. The hosting volume group is not varied on.
D. The /var and /tmp filesystems may be full.
[简答题]什么是File Access组件的FSO对象?
[单项选择]In a tree directory of a file system, relative path name can be used to find files for improving directory retrieval. To do this, which directory of the followings should be set up
A. parent directory
B. child directory
C. working directory
D. home directory
[单项选择]The new computer virus ______, the system was restored to its normal operation.
A. having removed
B. being removed
C. had been removed
D. was removed
[单项选择]A file on the system ahs been lost, but the latest version is on a mksysb tape. The file is extracted from this mksysb tape by loading the tape. Which of the following indicates where the tape will be skipped forward?()
A. Third image, and resoting the file with the tar command
B. Third image, and restoring the file with the dd command
C. Fourth image, and restoring the file with the restore command
D. Fourth image followed by the tar command
[单项选择]The operating system file cratab in the Linux platform gets updated whenever you create a new database on the same host machine. What kind of information is stored is stored in this file?()
A. OracleSIDsonly
B. Oracle homes only
C. Oracle install timestamp
D. Oracle inventory pointer files
E. Oracle database creation timestamp
F. OracleSIDsand Oracle homes only
G. OracleSIDs, Oracle homes and flag for auto startup

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码