单项选择题
A.Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.
B.Increase the number of licenses; using smit chaili cense
C.Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.
D.Change User can logi field from false to true: using smit chuser.
单项选择题 When rejecting applied an dependent updates on an AIX 5L system, which of the following procedures is most appropriate to follow?()
单项选择题 A basic TCP/IP configuration on the system has just been completed. A remote system can be pinged by IP address but not by hostname. Which of the following actions should be performed next in an effort to successfully ping using the hostname?()
单项选择题 A graphics card has been added and the system rebooted. When running the lsdev-Cc adapter, the graphics card is not listed in the output. Which of the following actions should be performed?()