网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()
A

 All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. 

B

 All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. 

C

 All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. 

D

 All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.


参考答案

参考解析
解析: 暂无解析
更多 “单选题The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()A  All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. B  All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. C  All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. D  All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.” 相关考题
考题 Which of the following commands should be used to delete an entry from the /etc/inittab?() A.xitabB.rmitabC.chitabD.delitab

考题 After applying a new ACL on a device, its CPU utilization rose significantly and many messages startingwith "%SEC-6-IPACCESSLOG" appeared on the Syslog server.What can be done to resolve this situation?()A、Increase memory allocation for ACLs.B、Remove all entries from the ACL and use a single permit ip any any statement.C、Remove the log keyword from each ACL entry.D、Reboot the device after the ACL has been applied.

考题 Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()A、PhysicalB、LogicalC、SoftwareD、Authentication

考题 As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you in what might happen if he issues the logging trap information command. Which of the following statement will answer his quest|on?()A、Informational and debug messages are logged to the syslog server.B、All messages are sent to the logging host, where selections are made.C、An information trap is sent to the SNMP server.D、All messages from emergencies to informational are sent to the logging host.

考题 Which of the following are shared distribution tree characteristics? (Choose all that apply.)()A、Memory requirements are higher for shared distribution tree than for source distribution treeB、Creates a tree from a central RP to all last-hop routersC、Uses a rendezvous pointD、An optimal path is created between each source router and each last-hop routerE、Place (S,G) entry in each router’s multicast routing tableF、Place (*,G) entry in a router’s multicast routing to table

考题 DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()A、 validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP serversB、 intercepts all ARP requests and responses on untrusted portsC、 builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addressesD、 uses the DHCP snooping binding database to validate subsequent requests from untrusted hostsE、 limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry

考题 A blade server has been configured to boot from SAN.  After an HBA firmware upgrade the blade was rebooted and cannot find the operating system.  Which of the following should the administrator do NEXT to troubleshoot the issue?()A、Verify all HBA settings.B、Upgrade the blade firmware.C、Upgrade the OS level HBA drivers.D、Set the system to boot from the local disk.

考题 At system install, the /etc/syslog.conf file specifies that messages be logged for which facilities?()A、communicationsB、kernelC、securityD、none

考题 How can a directory be excluded from a mksysb backup of the following?()A、Put an entry in the /etc/exclude.rootvg fileB、Put an entry in the /etc/mksysb.exclude fileC、Remove the directory’s entry from the mksysb /image.data fileD、Remove the directory’s entry from the /var/adm/ras/bosinst.data file

考题 Which of the following commands should be used to delete an entry from the /etc/inittab?()A、xitabB、rmitabC、chitabD、delitab

考题 Which procedure should be used to configure the system to prevent all users from using the ’at’ command()?  A、Create a /var/adm/cron/at.allow file with no entriesB、Create a /var/adm/cron/at.deny file with ’*’ as the only entryC、Create a /var/adm/at/at.deny file with ’ALL’ as the only entryD、Create a /var/adm/at/at.allow file with ’NONE’ as the only entry

考题 The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()A、 All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. B、 All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. C、 All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. D、 All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.

考题 Your PROD database has been started using the server parameter file. In your PROD database you are using RMAN for backup and recovery operations. You issue the following commands from the RMAN prompt:     RMAN CONFIGURE CONTROLFILE AUTOBACKUP OFF;   RMAN BACKUP DATABASE;   Which files from the database will be backed up as a result of this BACKUP command?()A、 control fileB、 all datafilesC、 password fileD、 online redo log fileE、 archive redo log fileF、 server parameter fileG、 only the SYSTEM datafile

考题 You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The organization contains five Hub Transport servers.All of the Hub Transport servers are listed as source servers for a Send connector to the Internet.  You need to prevent a Hub Transport server named Hubl from sending and receiving e-mail messages from the Internet.The solution must meet the following requirements:  (1)Ensure that Mailbox servers can deliver e-mail messages to Hub1. (2)Ensure that all other Hub Transport servers can deliver e-mail messages to the Internet. What should you do on Hub1?()A、Suspend all message queues.B、Stop the Microsoft Exchange Transport service.C、Disable all Receive connectors and Send connectors.D、Stop the Microsoft Exchange Mail Submission Service.

考题 单选题How can a directory be excluded from a mksysb backup of the following?()A Put an entry in the /etc/exclude.rootvg fileB Put an entry in the /etc/mksysb.exclude fileC Remove the directory’s entry from the mksysb /image.data fileD Remove the directory’s entry from the /var/adm/ras/bosinst.data file

考题 单选题A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?()A MulticastingB Proxy serverC NATD Subnetting

考题 单选题A blade server has been configured to boot from SAN.  After an HBA firmware upgrade the blade was rebooted and cannot find the operating system.  Which of the following should the administrator do NEXT to troubleshoot the issue?()A Verify all HBA settings.B Upgrade the blade firmware.C Upgrade the OS level HBA drivers.D Set the system to boot from the local disk.

考题 多选题For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).ADisable all 802.11 trafficBDisable the SSID from broadcastingCDisable WPADEnable Bluetooth only communicationEChange the default admin passwordFDisable WEP

考题 单选题You are an administrator in a company that has a Main Office and 5 branch offices.In every branch office exist a Hub Transport server, and only in Main Office exists an Edge server.You add a disclaimer to all internal and external e-mail messages sent by users in the company. You discover that e-mail messages sent from one of Branch Offices do not include the disclaimer.You need to ensure that all e-mail messages include disclaimer.What should you do?()A Restart Microsoft Exchange System AttendantB Modify cache settings of Branch Offices Hub Transport ServerC Force Active Directory replication on the Branch Office Domain ControllerD Export all transport rules from the Hub Transport Server in Main Office import the transport rules in the branch office Hub Transport Server

考题 单选题Which procedure should be used to configure the system to prevent all users from using the ’at’ command()?A Create a /var/adm/cron/at.allow file with no entriesB Create a /var/adm/cron/at.deny file with ’*’ as the only entryC Create a /var/adm/at/at.deny file with ’ALL’ as the only entryD Create a /var/adm/at/at.allow file with ’NONE’ as the only entry

考题 单选题Which of the following commands should be used to delete an entry from the /etc/inittab?()A xitabB rmitabC chitabD delitab

考题 单选题You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The organization contains five Hub Transport servers.All of the Hub Transport servers are listed as source servers for a Send connector to the Internet.  You need to prevent a Hub Transport server named Hubl from sending and receiving e-mail messages from the Internet.The solution must meet the following requirements:  (1)Ensure that Mailbox servers can deliver e-mail messages to Hub1. (2)Ensure that all other Hub Transport servers can deliver e-mail messages to the Internet. What should you do on Hub1?()A Suspend all message queues.B Stop the Microsoft Exchange Transport service.C Disable all Receive connectors and Send connectors.D Stop the Microsoft Exchange Mail Submission Service.

考题 单选题After applying a new ACL on a device, its CPU utilization rose significantly and many messages starting with "%SEC-6-IPACCESSLOG" appeared on the Syslog server. What can be done to resolve this situation?()A Increase memory allocation for ACLs.B Remove all entries from the ACL and use a single permit ip any any statement.C Remove the log keyword from each ACL entry.D Reboot the device after the ACL has been applied.

考题 单选题The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()A  All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. B  All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. C  All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. D  All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.

考题 单选题A system has a TCPIP issue that is a known problem. The newest code from the support website has been downloaded to resolve the issue. Which of the following commands should be used to install the new code?()A smitty install_commitB installp -ugVC installp -aXD instfix -all

考题 单选题Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()A REVOKE ALL PRIVILEGES FROM USER tomB REVOKE ALL ON EMPLOYEE FROM USER tomC REVOKE EXECUTE ON EMPLOYEE FROM USER tomD REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom

考题 单选题Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()A PhysicalB LogicalC SoftwareD Authentication

考题 单选题At system install, the /etc/syslog.conf file specifies that messages be logged for which facilities?()A communicationsB kernelC securityD none