单选题Which of the following commands can be used to gain root privileges and profile without initially logging in as root?()A  su B  su root C  su - root D  su -c root

题目
单选题
Which of the following commands can be used to gain root privileges and profile without initially logging in as root?()
A

 su 

B

 su root 

C

 su - root 

D

 su -c root

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

In your multitenant container database (CDB) containing same pluggable databases (PDBs), you execute the following commands in the root container:Which two statements are true?()

A. The C # # ROLE1 role is created in the root database and all the PDBs.

B. The C # # ROLE1 role is created only in the root database because the container clause is not used.

C. Privileges are granted to the C##A_ADMIN user only in the root database.

D. Privileges are granted to the C##A_ADMIN user in the root database and all PDBs.

E. The statement for granting a role to a user fails because the CONTAINER clause is not used.


参考答案:B, C

第2题:

Mysqldump was used to create a single schema backup; Shell> mysqldump –u root –p sakila > sakila2013.sql Which two commands will restore the sakila database without interfering with other running database?()

  • A、Mysql> USE sakila; LOAD DATA INFILE 'sakila2013.sql';
  • B、Shell> mysql –u root –p sakila sakila2013.sql
  • C、Shell> mysql import –u root –p sakila sakila2013.sql
  • D、Shell> mysql  –u root -p  –e 'use sakila; source sakila2013.sql'
  • E、Shell> mysql  –u root  –p  –silent < sakila2013.sql

正确答案:B,D

第3题:

Linux系统里,如果不想任何人都可以用“su”命令成为root,必须修改()文件。

A./etc/pam.d/root

B./etc/pam.d/su

C./etc/security/root

D./etc/security/su


参考答案:B

第4题:

Which of the following commands can be used to gain root privileges and profile without initially logging in as root?()

  • A、 su 
  • B、 su root 
  • C、 su - root 
  • D、 su -c "root"

正确答案:C

第5题:

Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()

  • A、Designated Root Cost
  • B、bridge ID priority
  • C、max age
  • D、bridge ID MAC address
  • E、Designated Root Priority
  • F、forward delay

正确答案:B,D

第6题:

A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with apermission error message.What action will resolve the problem?()

A.Add root user to the /etc/hosts.equiv on serverB

B.Create $HOME/.rhosts file for the root user on serverB

C.Restart the rshd daemon with root enabled option on serverB

D.Add entry to allow root user from serverA to the /etc/hosts.allow on serverB


参考答案:D

第7题:

Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree  Protocol IEEE 802.1D? ()

  • A、Designated Root Cost
  • B、bridge ID priority
  • C、max age
  • D、bridge ID MAC address
  • E、Designated Root Priority
  • F、forward delay

正确答案:B,D

第8题:

Unix系统中的超级用户root拥有最大权限,黑客可以通过下列哪条命令获得root权限()。

A、find

B、grep

C、seek

D、su


参考答案:D

第9题:

Which of the following settings will reduce packet overhead and overall latency in a standalonepoint-to-point bridge deployment?()

  • A、enable concatenation on the non-root bridge only
  • B、enable concatenation on the root bridge only
  • C、enable concatenation on both the root bridge and non-root bridge
  • D、enable concatenation on the root bridge and set it as desirable on the non-root bridge
  • E、set concatenation as desirable on the root bridge and enable it on the non-root bridge

正确答案:C

第10题:

5520AMS服务器登录为根(root)用户,输入下面命令切换到amssys

  • A、su amssys
  • B、su - amssys
  • C、add amssys
  • D、ls amssys

正确答案:B

更多相关问题