-
The root id is set so that direct login is disabled. Information must be reviewed relating to when root access was obtained. In which of the following files is this information located?()
A . /var/adm/sulog
B . /var/adm/wtmp
C . /etc/security/user
D . /etc/security/failedlogi
-
As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the devicE.For what two reasons can this happen? ()
A . The data is moving from 10BASE-TX to 100BASE-TX.
B . The WAN encapsulation type has changed.
C . The data format has changed from analog to digital.
D . The source and destination hosts are in the same subnet.
E . The source and destination MAC addresses have changed.
-
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this()
A . audit
B . syslog
C . TCB
D . sysck
-
PLS BE INFORMED THAT SUB VSL’S TWO KINDS OF CERTIFICATES HAVE EXPIRED. ONE IS DERATING CERTIFICATE AND THE OTHER IS SAFETY EQUIPMENT CERITFICATE. According to this telex,().
A . two certificates have expired
B . two certificates will expire
C . one of the two certificates have expired
D . one of the two certificates will expire
-
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()
A . fwtmp < /etc/security/failedlogin
B . cat /etc/security/failedlogin
C . who
D . alog -f /etc/security/failedlogin -o
-
You execute this command in MOUNT mode: ALTER DATABASE ARCHIVELOG; Where is the information that the database is now in ARCHIVELOG mode stored?()
A . SPFILE
B . archive log
C . control file
D . system tablespace
-
A customer asks which bays they could install Multi-Switch Interconnect Module (MSIM). Which of the following is the source of this information?()
A . CDAT
B . IBM Systems Director
C . Tivoli Provisioning Manager (TPM)
D . BladeCenter Interoperability guide
-
An administrator requires a summary of current configuration for each system. This is needed for an audit trail. Which of the following will provide this information()
A . configassist
B . prtconf
C . Isattr
D . listdgr
-
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()
A . audit
B . syslog
C . TCB
D . sysck
-
Information theory is related to the quantification of information. This was developed by Claude E. Shannon to who found fundamental limits on ( ) operations such as compressing data and on reliably storing and communicating data.
A . signal
B . data
C . information
D . signal processing
-
After a number of days set by the parameter CONTROL_FILE_RECORD_KEEP_TIME, the information in the control file is overwritten by RMAN. What is this parameter’s default value?()
A . 1 day
B . 5 days
C . 7 days
D . 31 day
-
As a frame leaves a Layer 3 device,the Layer 2 encapsulation information is changed from what it was when it entered the device. For what two reasons can this happen?()
A . The data is moving from 10BASE-TX to 100BASE-TX.
B . The WAN encapsulation type has changed.
C . The data format has changed from analog to digital.
D . The source and destination hosts are in the same subnet.
E . The source and destination MAC addresses have changed.
-
You need to receive alerts when unanalyzed software is detected on your computer. You must achieve this goal without sending information to Microsoft. What should you do?()
A . Confirm that Windows Defender is not subscribed to the Microsoft Spynet online community. Select the Use heuristics to detect potentially harmful or unwanted behavior by software that hasnt been analyzed for risks checkbox in Windows Defender.
B . Configure Windows Defender with a basic membership to the Spynet online community.
C . Configure Windows Defender with an advanced membership to the Spynet online community.
D . Configure the Software Explorer option in Windows Defender to display software for all users.
-
The operating system filecratabin the Linux platform gets updated whenever you create a new database on the same host machine. What kind of information is stored is stored in this file?()
A . OracleSIDsonly
B . Oracle homes only
C . Oracle install timestamp
D . Oracle inventory pointer files
E . Oracle database creation timestamp
F . OracleSIDsand Oracle homes only
G . OracleSIDs, Oracle homes and flag for auto startu
-
A customer needs detailed information on the internal architecture of the new p5-570. Which of the following is the most appropriate place to get this documentation?()
A . IBM sales manual
B . IBM Redbooks Website
C . IBM eServer p5 and pSeries Qs and As
D . IBM eServer p5 and pSeries Facts and Feature
-
The operating system file cratab in the Linux platform gets updated whenever you create a new database on the same host machine. What kind of information is stored is stored in this file?()
A . OracleSIDsonly
B . Oracle homes only
C . Oracle install timestamp
D . Oracle inventory pointer files
E . Oracle database creation timestamp
F . OracleSIDsand Oracle homes only
G . OracleSIDs, Oracle homes and flag for auto startu
-
I believe this information is ____. This cannot be true.
-
It is said that more middle school graduates will be admitted into universities,this is the information ____ has been put forward.
-
This information is supplied in the strictest confidence.本信息属于最高机密。
-
Also, the device must be able to inform the outside world that it is running low on the chemicals ; once again this might be accomplished by a transponder setup .
-
听力原文:It is an intricate work that needs searching information on Internet. He can't do this work without a laptop or a desktop.
(29)
A.He can work better without a computer.
B.He is working with a new computer.
C.He has never used a computer in his work.
D.He needs a computer for his work.
-
You need to receive alerts when unanalyzed software is detected on your computer. You must achieve this goal without sending information to Microsoft.What should you do?()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/d0e934af788d97cd7344ca7cd06d9e15.jpg' />
A.A
B.B
C.C
D.D
-
Enter the information age. Information is the raw material for many of the business activities【62】this new era, just as iron and steel were the basic commodities in the【63】of the industrial age.
The world's knowledge is said to be doubling every eight years. This knowledge【64】is stimulating economic progress. The need to collect, analyze, and communicate great【65】of information is producing new products and services, creating jobs, and【66】career opportunities.
The information age is【67】considered to be a phenomenon of the service sector of the economy,【68】than a product of heavy industry. Certainly, rocketing information technologies are creating new capabilities【69】knowledge-based service spheres.【70】changes just as dramatic are【71】industry, giving people the【72】to do challenging work in exciting new ways.
Manufacturing is full【73】in the information age. From design to production, the manufacturing【74】has long been information-intensive. It always has required exacting communication to describe what goes into products and how to make them. Now, computer technology is giving factory managers new【75】to gather all of this information and use it to control production.
Telecommunications are producing error-free communication between the design office and the factory. Computer-aided design is enabling engineers to【76】product performances and manufacturing process on video displays, before resources are committed to build and test prototypes. Techniques like these are bringing【77】new advances in manufacturing productivity. Just as coal fueled the【78】to an industrial society, so microelectronics is powering the【79】of the information age. Microelectronic information management tools are【80】U.S. industrial capabilities, which remains【81】to America's economic wellbeing and national security.
(63)
A.seeking
B.stimulating
C.shaping
D.securing
-
This part is to test your ability to do practical writing. You are required to write an introduction according to the following information given in Chinese.
假设你是英国Wida Software公司的秘书,叫Mary Williams,你公司经理等一行4人于9月 24日要去中国上海洽谈业务,请以e-mail形式向中国民航(Air China)伦敦办事处订购四张去上海的机票,并在邮件相关的地方写清楚如下内容:
收件人:bookoffice.ld@airchina.uk
主题:订购机票
邮件应包括下列要点:
1.订4张下周一,即9月24日下午4点飞往上海的机票。
2.希望三天后将机票送往你公司驻伦敦办事处;Wida Software Ltd. 2 Nicholas Gardens, London
3.你的联系电话是:0044-081-4005004
Receiver:
Subject: