CMS专题

单选题An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set W

题目
单选题
An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()
A

A shell other than ksh is being used by the user.

B

The line ’export ENV=$HOME/.env’ is missing from /etc/profile.

C

The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.

D

The env_profile attribute is not defined for the user within /etc/security/user.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Anadministratorcreateda.envfileinauser’shomedirectorytoconfigureanumberofcustomenvironmentvariablesforalocalapplication.However,aftertheuserlogsoutandthenlogsbackintothesystem,thecustomvariablesarenotbeingsetWhatisthemostlikelyreasonthatthecustom.envfileisbeingignored?()

A.Ashellotherthankshisbeingusedbytheuser.

B.Theline’exportENV=$HOME/.env’ismissingfrom/etc/profile.

C.Theline’exportENV=$HOME/.env’ismissingfromtheuser’s.profile.

D.Theenv_profileattributeisnotdefinedfortheuserwithin/etc/security/user.


参考答案:C

第2题:

A user is unable to determine the default system text editor. How can the local administrator assist the user by identifying the default text editor for the system?()

  • A、Login as the user and run ’echo $ENV’.
  • B、Login as root and run the ’env’ command.
  • C、Login as root and ’cat /etc/environment’.
  • D、Login as the user and run the ’env’ command.

正确答案:B

第3题:

Given that the current directory is empty, and that the user has read and write privileges to the current, and the following:Which statement is true?()

A.Compilation fails.

B.Nothing is added to the file system.

C.Only a new file is created on the file system.

D.Only a new directory is created on the file system.

E.Both a new file and a new directory are created on the file system.


参考答案:B

第4题:

What should an administrator do to allow the logon of a user to a local system without limitations from the host ‘webserver’?()

  • A、configure the /etc/.rhosts with. webserver <user>
  • B、configure the root'$HOME/.rhost file with.+webserver <user>
  • C、configure each user's $HOME/.rhosts file with. webserver <user>
  • D、configure the root'$HOME/.rhost file with.<webserver ip> <user>

正确答案:C

第5题:

A user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA.  No other users are experiencing the same issue.Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem?()

  • A、User ’joe’ is specified in the /etc/nologin on SYSTEMA
  • B、User ’joe’ is specified in the /etc/nologin on SYSTEMB
  • C、The file permissions on the /home/joe/.rhosts file on SYSTEMA is correct.
  • D、The file permissions on the /home/joe/.rhosts file on SYSTEMB is incorrect.

正确答案:D

第6题:

When using the Tivoli Dynamic Workload Console, which monitor tasks are available to the user?()

  • A、 all those that have been created by all users
  • B、 just those created by the user in the current session
  • C、 all those created by the user and shared with user’s login group
  • D、 just those where the connection engine specifies the user’s logon

正确答案:C

第7题:

A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()

  • A、 Reboot the file server.
  • B、 Ask the user what they were doing when they noticed the problem.
  • C、 Ask the user to reboot their PC.
  • D、 Ask the user to ping the default gateway and report the response times back to the administrator.

正确答案:B

第8题:

You are a network administrator for Ezonexam.com's Windows 2000 network.

Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

What should you do?

A.Use System File Checker (SFC) to decrypt the file.

B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

C.Log on the network as the administrator. Use the cipher command to decrypt the files.

D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


正确答案:B
解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

Incorrect answers:
A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

第9题:

Which of the following is a correct statement about how the user environment is configured at login?()

  • A、If present, the settings in the $HOME/.profile file will override the settings in the /etc/profile file.
  • B、If both $HOME/.profile and $HOME/.env files are present, the settings in the $HOME/.profile file will take precedence.
  • C、The settings in the /etc/environment file are system-wide and will override user customized settings in the $HOME/.profile.
  • D、The settings in the /etc/profile file will override settings in the $HOME/.profile file unless the $LOCAL_PROFILE variable is set to 'true'.

正确答案:C

第10题:

What should an administrator do to allow the logon of a user to a local system without limitations from the host ’webserver’?()  

  • A、configure the /etc/.rhosts withweb:server
  • B、configure the root’$HOME/.rhost file with:+webserver 
  • C、configure each user’s $HOME/.rhosts file with:webserver 
  • D、configure the root’$HOME/.rhost file with: 

正确答案:C

更多相关问题