-
A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with a permission error message. What action will resolve the problem?()
A . Add root user to the /etc/hosts.equiv on serverB .
B . Create $HOME/.rhosts file for the root user on serverB .
C . Restart the rshd daemon with root enabled option on serverB .
D . Add entry to allow root user from serverA to the /etc/hosts.allow on serverB .
-
Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()
A . aaa authentication enable method default
B . aaa authentication enable default
C . aaa authentication enable level
D . aaa authentication enable default local
-
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm?()
A . The PC has connectivity with a local host.
B . The PC has connectivity with a Layer 3 device.
C . The PC has a default gateway correctly configured.
D . The PC has connectivity up to Layer 5 of the OSI model.
E . The PC has the TCP/IP protocol stack correctly installed.
-
You issue the following RMAN command to set a retention policy on a database: RMAN>CONFIGURE RETENTION POLICY TO REDUNDANCY 2; What will be the outcome of the above command?()
A . After two days, the backup will be marked obsolete.
B . After two days, the backup will be deleted from the media.
C . If the RMAN repository has records of two or more recent backups of a file, then the older backup will be deleted from the media.
D . If the RMAN repository has records of two or more recent backups of a file, then the older backup will be marked obsolete.
-
A user issues a SELECT command against the Oracle database. Which of the following choices describes a step that Oracle will execute in support of this statement?()
A . Acquire locks on table queried
B . Generate redo for statement
C . Fetch data from disk into memory
D . Write changes to disk
-
The user SCOTT who is the owner of ORDERS and ORDERJTEMS tables issues the following GRANT command: GRANT ALL ON orders, order_items TO PUBLIC; What correction needs to be done to the above statement? ()
A . PUBLIC should be replaced with specific usernames.
B . ALL should be replaced with a list of specific privileges.
C . WITH GRANT OPTION should be added to the statement.
D . Separate GRANT statements are required for ORDERS and ORDERJTEMS tables.
-
The DBA issues this SQL command:
https://assets.asklib.com/images/image2/2018080117142684706.jpg
What privileges does the user Scott have at this point?()
A . No privileges.
B . Only the SELECT privilege.
C . Only the CONNECT privilege.
D . All the privileges of a default user.
-
You executed the following command to drop a user: DROP USER scott CASCADE; Which two statements regarding the above command are correct?()
A . All the objects of scott are moved to the Recycle Bin.
B . Any objects in the Recycle Bin belonging to scott are purged.
C . All the objects owned by scott are permanently dropped from the database.
D . All the objects of scott in the Recycle Bin must be purged before executing the DROP command.
E . Any objects in the Recycle Bin belonging to scott will not be affected by the above DROP command.
-
The DBA issues this SQL command: CREATE USER scott IDENTIFIES by tiger; What privileges does the user Scott have at this point? ()
A . No privileges.
B . Only the SELECT privilege.
C . Only the CONNECT privilege.
D . All the privileges of a default user.
-
A server is experiencing performance issues and the SAN could be a potential bottleneck. Which command will show the queue depth of hdisk1?()
A . lspv hdisk1
B . lscfg hdisk1lscfg ? hdisk1
C . lsdev c hdisk1lsdev ?c hdisk1
D . lsattr l hdisk1lsattr ?l hdisk1
-
What is the correct command for creating a new user ID authenticated with LDAP?()
A . mkuser -R LDAP
-
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm?()
A . The PC has connectivity with a local host.
B . The PC has connectivity with a Layer 3 device.
C . The PC has a default gateway correctly configured
D . The PC has connectivity up to Layer 5 of the OSI model
E . The PC has the TCP/IP protocol stack correctly installed.
-
You executed the following command to drop a user: DROP USER scott CASCADE; Which two statements regarding the above command are correct?()
A . All the objects of scott are moved to the Recycle Bin.
B . Any objects in the Recycle Bin belonging to scott are purged.
C . All the objects owned by scott are permanently dropped from the database.
D . All the objects of scott in the Recycle Bin must be purged before executing the DROP command.
E . Any objects in the Recycle Bin belonging to scott will not be affected by the above DROP command.
-
Which command will allow the creation of a 10-character login user name?()
A . A.chlogin -a log_name=10
B . B.chdev -l sys0 -a max_logname=10
C . C.chusr extended_logname=true [userid]
D . D.chuser login_name=10 extended_logname=true [userid]
-
A remote user is trying to telnet to the production server. The session is getting a timeout error. Which command should the user issue to verify the network connection?()
A . iptrace
B . nslookup
C . netstat
D . traceroute
-
non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with a permission error message. What action will resolve the problem? ()
A . Add root user to the /etc/hosts.equiv on serverb
B . Create $HOME/.rhosts file for the root user on serverb
C . Restart the rshd daemon with root enabled option on serverb
D . Add entry to allow root user from serverA to the /etc/hosts.allow on server
-
In a TCP/IP network, which of the following protocols is involved when a user issues a ping command?()
A . TCP
B . UDP
C . ICMP
D . SMTP
-
You issue the following RMAN command to set a retention policy on a database: RMAN>CONFIGURE RETENTION POLICY TO REDUNDANCY 2; What will be the outcome of issuing this command?()
A . After two days,a backup will be marked obsolete
B . After two days,a backup will be deleted from the media
C . If the RMAN repository has records of two or more recent backups of a file,then older backups will be deleted from the media.
D . If the RMAN repository has records of two or more recent backups of a file then older backups will be marked obsolete.
-
Examine the RMAN command: SWITCH DATAFILE ’/DISK3/user_data01.dbf’; Which command do you need to issue before you issue the above command, so that RMAN finds the file in the restored location of ’DISK2/user_data01.dbf’? ()
A . RESTORE DATAFILE ’/DISK2/user_data01.dbf’
B . RESTORE DATAFILE ’/DISK3/user_data01.dbf’
C . SET NEWNAME FOR ’/DISK3/user_data01.dbf’ TO’/DISK2/user_data01.dbf’
D . SET NEWNAME FOR ’/DISK2/user_data01.dbf’ TO’/DISK3/user_data01.dbf&rsquo
-
You issue the following RMAN command to set a retention policy on a database: RMAN>CONFIGURE RETENTION POLICY TO REDUNDANCY 2; What will be the outcome of issuing this command? ()
A . After two days, a backup will be marked obsolete
B . After two days, a backup will be deleted from the media
C . If the RMAN repository has records of two or more recent backups of a file, then older backups will be deleted from the media.
D . If the RMAN repository has records of two or more recent backups of a file, then older backups will be marked obsolete.
-
A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with apermission error message. What action will resolve the problem?()
A . Add root user to the /etc/hosts.equiv on serverB
B . Create $HOME/.rhosts file for the root user on serverB
C . Restart the rshd daemon with root enabled option on serverB
D . Add entry to allow root user from serverA to the /etc/hosts.allow on serverB
-
A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with apermission error message.What action will resolve the problem?()
A.Add root user to the /etc/hosts.equiv on serverB
B.Create $HOME/.rhosts file for the root user on serverB
C.Restart the rshd daemon with root enabled option on serverB
D.Add entry to allow root user from serverA to the /etc/hosts.allow on serverB
-
You have just issued the command user@router save current.conf.Assuming the default settings, where in the file system is current.conf saved?()
A./var/tmp/
B. /var/config/saved/
C. /var/home/user/
D. /config/
-
While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out."
At which OSI layer is this problem associated with?
A.The data link layer
B.The application layer
C.The access layer
D.The session layer
E.The network layer