题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2024-01-17 00:22:04

[单项选择]A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()
A. Set the group’s folder permissions to deny.
B. Use Event Viewer to monitor changes to the file.
C. Store a backup copy of the file on a USB drive.
D. Change the file attribute to read only.

更多"A program configuration file on a s"的相关试题:

[单项选择]What is the default configuration file used by the sendmail command?()
A. /etc/rc/rc.mail
B. /etc/mail.config
C. /etc/sendmail.config
D. /etc/mail/sendmail.cf
[单项选择]With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()
A. IETF
B. PFC
C. TCAM
D. ASIC
[单项选择]A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()
A. Application log
B. File Replication log
C. System log
D. Security log
[单项选择]The most important program on any computer is ().
A. Office 2000
B. Virus
C. software
D. Operating system
[单项选择]This program ______ computer files so they can be easily sent by email.
A. suppresses
B. compresses
C. presses
D. impresses
[单项选择]Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()
A. From Network Connections, right-click the active network connection, and then click Status.
B. From Network Connections, select the active network connection, and then click Diagnose this connection.
C. From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.
D. From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.
[单项选择]Your network contains a computer named Computer1. Computer1 is assigned an IP address of 39 / 84 192.168.1.112/26.Your companys corporate policy states that the first usable address in each subnet is allocated to the default gateway.You need to configure the default gateway for Computer1.Which address should you choose?()
A. 192.168.1.1
B. 192.168.1.63
C. 192.168.1.65
D. 192.168.1.93
[单项选择]About the computer towns and the computer clubs, David Tebutte thinks that______
A. it is just to take trouble to see the two working side by side
B. the computer towns are more important than the computer clubs
C. they can complement each other but there is great difference between
D. the computer clubs are as important as the computer towns
[单项选择]A ()computer is a personal computer whose hardware is capable of using any or all of the following media in a program: audio, text, graphics, video and animation.
A. database
B. multimedia
C. network
D. mainframes
[单项选择]Which configuration command configures queue buffer allocation on the ERX Edge Router?()
A. qos-profile
B. queue-profile
C. scheduler-profile
D. traffic-shape-profile
[单项选择]Which configuration shows the correct application of a security policy scheduler?()
A. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } scheduler-name now; } } }
B. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }
C. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn scheduler-name now; } } } }
D. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; scheduler-name now; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }myTunnel;
[多项选择]Identify the persistent configuration setting for the target database that can be set for the backup by using RMAN.() (Choose all that apply.)
A. Backup retention policy
B. Default backup device type
C. Default destinations for backups
D. Multiple backup device types for single backup
E. Default section size for backups
[单项选择]Which profile configuration command dynamically creates a host route in the routing table?()
A. ip host routes
B. ip access-routes
C. host routes enabled
D. access-routes enabled
[单项选择]Which configuration command permits dynamic detection of the ATM frame format?()
A. aal5mux
B. aal5snap
C. aal5dynamic
D. aal5autoconfig
[单项选择]Which configuration command dynamically detects and configures a PPPoA interface?()
A. auto-configure ip
B. auto-configure ppp
C. auto-configure pppoe
D. auto-configure bridgedethernet
[多项选择]A network administrator changes the configuration register to 0x2142 and reboots the router. What are two results of making this change?()
A. The IOS image will be ignored.
B. The router will prompt to enter initial configuration mode.
C. The router will boot to ROM.
D. Any configuration entries in NVRAM will be ignored.
E. The configuration in flash memory will be booted.

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

截图扫码使用小程序[完全免费查看答案]
请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码