IBM(000-104)

单选题An administrator learns that users are unable to login to a server via ssh. After making a telnet connection to the server, how can the administrator check the status of the sshd subsystem?()A lssys -a comB lssys -a sshdC lssrc -s sshdD lssrc -s tcpip

题目
单选题
An administrator learns that users are unable to login to a server via ssh. After making a telnet connection to the server, how can the administrator check the status of the sshd subsystem?()
A

lssys -a com

B

lssys -a sshd

C

lssrc -s sshd

D

lssrc -s tcpip

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A user is unable to connect to the company‘s intranet server by FQDN, but can connect by IP address. Other users are not having a problem. An administrator verifies that the user can successfully ping the server by IP address and can properly resolve the FQDN using nslookup. The problem is persisting after running ipconfig /flushdns.Which of the following should the administrator do NEXT?()

A. Examine the Imhost file.

B. Flush the cache on the DNS server.

C. Flush the cache on the WINS server.

D. Examine the hosts file


参考答案:D

第2题:

下列哪组中的用户能够共享文件夹()。

  • A、Administrators,ServerOperators和PowerUsers
  • B、Users和ServerOperators
  • C、Users和PowerUsers
  • D、Users和Administrator

正确答案:A

第3题:

You use—login-path to access a MySQL server on a Linux installation.Which statement is true about the – login-path option that is created by using mysql_config_editor?()

A.All system users have access to the MySQL server via—login path local

B.login-path can be used only for MySQL servers running on a local machine

C.login-path allows you to provide login credentials without passing clear text passwords on the command line

D.When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later


参考答案:C

第4题:

A user is unable to determine the default system text editor. How can the local administrator assist the user by identifying the default text editor for the system?()

  • A、Login as the user and run ’echo $ENV’.
  • B、Login as root and run the ’env’ command.
  • C、Login as root and ’cat /etc/environment’.
  • D、Login as the user and run the ’env’ command.

正确答案:B

第5题:

Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()

  • A、 Verify the configuration of the connected port on the network switch.
  • B、 Reboot the server.
  • C、 Install a new NIC on the server.
  • D、 Verify that network cables are connected.

正确答案:D

第6题:

What must an administrator do to prevent new telnet users from connecting to the system?()

A.rmdev -l /dev/pts

B.touch /etc/nologin

C.chdev -l sys0 -a nologin

D.chuser -a login=false ALL


参考答案:B

第7题:

A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()

  • A、Logging detect fail-login
  • B、Login on-failure log
  • C、Login detect login-failure log
  • D、Logging login on-failure
  • E、none of the above

正确答案:B

第8题:

Which two statements are true of login classes?()

A. Users can be members of multiple login classes.

B. Login classes define authorization parameters for a user.

C. There are five system-defined login classes.

D. Login class permission flags can be overridden for certain commands.


参考答案:B, D

第9题:

A user is unable to determine the default system texteditor. How can the local administrator assist the user by identifying the default text editor for the system?()

  • A、Login as the user and run 'echo $ENV'.
  • B、Login as root and run the 'env' command.
  • C、Login as root and 'cat /etc/environment'.
  • D、Login as the user and run the 'env' command.

正确答案:B

第10题:

Which two statements are true of login classes?()

  • A、Users can be members of multiple login classes.
  • B、Login classes define authorization parameters for a user.
  • C、There are five system-defined login classes.
  • D、Login class permission flags can be overridden for certain commands.

正确答案:B,D

更多相关问题