网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()
A
/var/adm/sulog
B
/etc/syslog.conf
C
/etc/security/sysck.cfg
D
/etc/security/login.cfg
参考答案
参考解析
解析:
暂无解析
更多 “单选题A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A /var/adm/sulogB /etc/syslog.confC /etc/security/sysck.cfgD /etc/security/login.cfg” 相关考题
考题
Asystemadministratorwasaskedtologinformationonpossiblesecuritybreachesonaserver.Whichfileshouldadditionalentriesbeaddedtocapturethisinformation?()
A./var/adm/sulogB./etc/syslog.confC./etc/security/sysck.cfgD./etc/security/login.cfg
考题
ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis()
A./etc/security/limitsB./etc/security/mkuser.sysC./etc/security/privD./etc/security/user
考题
Therootidissetsothatdirectloginisdisabled.Informationmustbereviewedrelatingtowhenrootaccesswasobtained.Inwhichofthefollowingfilesisthisinformationlocated?()
A./var/adm/sulogB./var/adm/wtmpC./etc/security/userD./etc/security/failedlogin
考题
A user wants to be permanently added to the dba group. Which of the following commands or processes can be used to accomplish this()A、chgrpB、chuserC、edit /etc/userD、edit /etc/security/group
考题
Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A、/etc/security/userB、/etc/servicesC、/etc/inetd.confD、/etc/hosts.equiv
考题
A system administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location?()A、/tmp/conslogB、/etc/console.logC、/var/adm/ras/conslogD、/var/ras/console.log
考题
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()A、fwtmp /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o
考题
Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()A、/var/rmc/ctrmc.aclsB、/etc/ctrmc/rsct.aclsC、/etc/security/rsct.aclsD、/usr/sbin/rsct/cfg/ctrmc.acls
考题
A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A、Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B、Increase the number of licenses; using smit chaili censeC、Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D、Change User can logi field from false to true: using smit chuser.
考题
An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/syslog.conf
考题
Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default
考题
Which files are managed through the use of the file collection "HACMP_Files"?()A、The PowerHA Global ODM.B、System networking files including /etc/hosts, /etc/inetd.conf and /etc/servicesC、Security files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/groupD、User configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts
考题
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user
考题
The root id is set so that direct login is disabled. Information must be reviewed relating to when root access was obtained. In which of the following files is this information located?()A、 /var/adm/sulog B、 /var/adm/wtmp C、 /etc/security/user D、 /etc/security/failedlogin
考题
An administrator notices the / filesystem is 98% full. Which of the following files commonly grow rapidly()A、/var/adm/wtmpB、/etc/security/failedloginC、/smit.scriptD、/proc
考题
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/login.cfg
考题
单选题A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()A
fwtmp /etc/security/failedloginB
cat /etc/security/failedloginC
whoD
alog -f /etc/security/failedlogin -o
考题
单选题Which files are managed through the use of the file collection "HACMP_Files"?()A
The PowerHA Global ODM.B
System networking files including /etc/hosts, /etc/inetd.conf and /etc/servicesC
Security files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/groupD
User configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts
考题
单选题A system administrator would like to modify the system default user characteristics so that each new user will now be assigned (by default) the csh shell rather than the ksh shell. Which of the following actions should be performed?()A
Run the command chlogin -shell cshB
Run the command mkuser -default SHELL=cshC
Edit /etc/passwd and change all ksh entries to cshD
Modify the contents of /usr/lib/security/mkuser.default file
考题
单选题A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A
/etc/security/limitsB
/etc/security/mkuser.sysC
/etc/security/privD
/etc/security/user
考题
单选题A user wants to be permanently added to the dba group. Which of the following commands or processes can be used to accomplish this()A
chgrpB
chuserC
edit /etc/userD
edit /etc/security/group
考题
单选题An administrator notices the / filesystem is 98% full. Which of the following files commonly grow rapidly()A
/var/adm/wtmpB
/etc/security/failedloginC
/smit.scriptD
/proc
考题
单选题An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()A
/var/adm/sulogB
/etc/syslog.confC
/etc/security/sysck.cfgD
/etc/security/syslog.conf
考题
单选题Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A
/etc/security/userB
/etc/servicesC
/etc/inetd.confD
/etc/hosts.equiv
考题
单选题The root id is set so that direct login is disabled. Information must be reviewed relating to when root access was obtained. In which of the following files is this information located?()A
/var/adm/sulog B
/var/adm/wtmp C
/etc/security/user D
/etc/security/failedlogin
考题
单选题A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A
Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B
Increase the number of licenses; using smit chaili censeC
Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D
Change User can logi field from false to true: using smit chuser.
考题
单选题Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()A
/etc/security/userB
/etc/security/passwdC
/etc/security/mkuser.sysD
/etc/security/mkuser.default
热门标签
最新试卷