网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()
A

/var/adm/sulog

B

/etc/syslog.conf

C

/etc/security/sysck.cfg

D

/etc/security/login.cfg


参考答案

参考解析
解析: 暂无解析
更多 “单选题A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A /var/adm/sulogB /etc/syslog.confC /etc/security/sysck.cfgD /etc/security/login.cfg” 相关考题
考题 It is a kind of online service system, on which you can publish and exchange information with others who also are the members of the system.On which you can paste your articles and answer the questions asked by the members of the system and you can also look for help here.It isA.BBSB.WWWC.E-mailD.TELNET

考题 ● Most of the host operating system provides a way for a system administrator to manually configure the IP information needed by a host.Automated configuration methods, such as (72) , are required to solve the problem.(72)A.IPsecB.DHCPC.PPTPD.SOAP

考题 You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.

考题 Which information would you find using the CLI help function?() A. message of the dayB. tip of the dayC. explanation for specific system log error messagesD. explanation for specific traceoptions log messages

考题 Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? () A. Events logB. System logC. User Access logD. Admin Access log

考题 Most of the host operating system provides a way for a system administrator to manually configure the IP information needed by a host .Automated configuration methods such as ______, are required to solve the problem.A.IPsecB.DHCPC.PPTPD.SOAP

考题 The document management of information system engineering supervision is an important work, among them, information the () is a general class file.A.supervision summary reportB.weekly reportC.meeting summaryD.daily log

考题 Most of the host operating system provides a way for a system administrator to manually configure the IP information needed by a host. Automated configuration methods, such as (), are required to solve the problem.A.IPSec B.DHCP C.PPTP D.SOAP

考题 A system administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location?()A、/tmp/conslogB、/etc/console.logC、/var/adm/ras/conslogD、/var/ras/console.log

考题 What is the FIRST and most important step in system troubleshooting?()A、back up the system dataB、gather information about the problemC、try rebooting the system to see if that fixes the problemD、check the System Error Log or Event Log

考题 A System p administrator suspects they are receiving an error from one of their nightly cron jobs. The  job is: 0 1 * * * /usr/local/bin/nightlycheck.pl Where should the administrator first look for errors reported by  this cron job()A、/var/log/syslog.outB、var/log/cron.logC、/var/spool/cron/logsD、mail

考题 A system administrator has been asked to install an APAR but wants to be able to easily remove it. Which install option should be used?()A、applyB、cleanupC、commitD、reject

考题 An administrator requires a summary of current configuration for each system. This is needed for an  audit trail.  Which of the following will provide this information()A、configassistB、prtconfC、IsattrD、listdgrp

考题 An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/syslog.conf

考题 A system administrator decides to review the system error log after installing new hardware. Which of the following is the correct command to use?()A、errptB、syslogC、prtdiagD、errlogger

考题 An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()A、auditB、syslogC、TCBD、sysck

考题 A system administrator has been asked to lock a specific login account. Which of the following commands is used to accomplish this?()A、pwdckB、usrckC、chuserD、rmuser

考题 A System p administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down.  Where should the system administrator look for the console log, assuming it is in the default location()A、/var/log/conslogB、/var/log/console.logC、/var/adm/ras/conslogD、/var/ras/console.log

考题 A system administrator has been asked to document the hardware configuration of a system. Which command can be used to assist in this task?()A、lscfgB、mkdevC、lslppD、cfgmgr

考题 A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/login.cfg

考题 Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A、Events logB、System logC、User Access logD、Admin Access log

考题 You are maintaining your database in Oracle10g. You are not using the recovery catalog to maintain the backup information of your database. Which file can be used as a repository to store information regarding the RMAN backup?()A、 online redo log filesB、 alert log filesC、 control fileD、 datafiles associated with the SYSTEM tablespace

考题 单选题Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A Events logB System logC User Access logD Admin Access log

考题 单选题You are maintaining your database in Oracle10g. You are not using the recovery catalog to maintain the backup information of your database. Which file can be used as a repository to store information regarding the RMAN backup?()A  online redo log filesB  alert log filesC  control fileD  datafiles associated with the SYSTEM tablespace

考题 单选题An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()A /var/adm/sulogB /etc/syslog.confC /etc/security/sysck.cfgD /etc/security/syslog.conf

考题 单选题A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A /var/adm/sulogB /etc/syslog.confC /etc/security/sysck.cfgD /etc/security/login.cfg

考题 单选题A system administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location?()A /tmp/conslogB /etc/console.logC /var/adm/ras/conslogD /var/ras/console.log

考题 单选题A System p administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down.  Where should the system administrator look for the console log, assuming it is in the default location()A /var/log/conslogB /var/log/console.logC /var/adm/ras/conslogD /var/ras/console.log