网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()
- A、/etc/security/limits
- B、/etc/security/mkuser.sys
- C、/etc/security/priv
- D、/etc/security/user
参考答案
更多 “ A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user” 相关考题
考题
ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis()
A./etc/security/limitsB./etc/security/mkuser.sysC./etc/security/privD./etc/security/user
考题
Whichfilesaremanagedthroughtheuseofthefilecollection"HACMP_Files"?()
A.ThePowerHAGlobalODM.B.Systemnetworkingfilesincluding/etc/hosts,/etc/inetd.confand/etc/servicesC.Securityfilesincluding/etc/passwd,/etc/security/passwd,/etc/groupand/etc/security/groupD.UserconfigurablefilesincludingApplicationserverstartandstopscripts,custompreandpostnotificationeventsandapplicationmonitoringscripts
考题
AIX中下面哪个文件包含了对用户密码的设置信息()。A、/etc/passwdB、/etc/security/passwdC、/etc/security/environD、/etc/security/user
考题
A user wants to be permanently added to the dba group. Which of the following commands or processes can be used to accomplish this()A、chgrpB、chuserC、edit /etc/userD、edit /etc/security/group
考题
Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A、/etc/security/userB、/etc/servicesC、/etc/inetd.confD、/etc/hosts.equiv
考题
Which action changes the default editor for ALL users on the system from vi to edit of the following?()A、Issue the command: export EDITOR=/usr/bin/editB、Modify /.profile and change the EDITOR variable to /usr/bin/editC、Modify /etc/environment and add EDITOR=/usr/bin/edit export EDITORD、Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit
考题
A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()A、remove all other groups from the systemB、run the command mkuser -default "GROUP=database"C、change the default group in /usr/lib/security/mkuser.defaultD、edit /etc/security/group to move all users to the database stanza
考题
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()A、fwtmp /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o
考题
An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/syslog.conf
考题
Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default
考题
Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。A、~/ .rhostsB、$HOME/.netrcC、/etc/hosts.equivD、/etc/security/user
考题
Which files are managed through the use of the file collection "HACMP_Files"?()A、The PowerHA Global ODM.B、System networking files including /etc/hosts, /etc/inetd.conf and /etc/servicesC、Security files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/groupD、User configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts
考题
The root id is set so that direct login is disabled. Information must be reviewed relating to when root access was obtained. In which of the following files is this information located?()A、 /var/adm/sulog B、 /var/adm/wtmp C、 /etc/security/user D、 /etc/security/failedlogin
考题
An administrator notices the / filesystem is 98% full. Which of the following files commonly grow rapidly()A、/var/adm/wtmpB、/etc/security/failedloginC、/smit.scriptD、/proc
考题
The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?() A、 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B、 Use C-SPOC to synchronize the password files between cluster nodes.C、 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D、 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.
考题
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/login.cfg
考题
AIX中下面哪个文件包含了UID、HOME目录及shell信息()。A、/etc/passwdB、/etc/security/passwdC、/etc/security/environD、/etc/security/user
考题
单选题A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()A
remove all other groups from the systemB
run the command mkuser -default GROUP=databaseC
change the default group in /usr/lib/security/mkuser.defaultD
edit /etc/security/group to move all users to the database stanza
考题
单选题Which files are managed through the use of the file collection "HACMP_Files"?()A
The PowerHA Global ODM.B
System networking files including /etc/hosts, /etc/inetd.conf and /etc/servicesC
Security files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/groupD
User configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts
考题
单选题A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A
/var/adm/sulogB
/etc/syslog.confC
/etc/security/sysck.cfgD
/etc/security/login.cfg
考题
单选题A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A
/etc/security/limitsB
/etc/security/mkuser.sysC
/etc/security/privD
/etc/security/user
考题
单选题Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。A
~/ .rhostsB
$HOME/.netrcC
/etc/hosts.equivD
/etc/security/user
考题
单选题An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()A
/var/adm/sulogB
/etc/syslog.confC
/etc/security/sysck.cfgD
/etc/security/syslog.conf
考题
单选题Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A
/etc/security/userB
/etc/servicesC
/etc/inetd.confD
/etc/hosts.equiv
考题
单选题The root id is set so that direct login is disabled. Information must be reviewed relating to when root access was obtained. In which of the following files is this information located?()A
/var/adm/sulog B
/var/adm/wtmp C
/etc/security/user D
/etc/security/failedlogin
考题
单选题The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()A
On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B
Use C-SPOC to synchronize the password files between cluster nodes.C
On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D
On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.
考题
单选题Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()A
/etc/security/userB
/etc/security/passwdC
/etc/security/mkuser.sysD
/etc/security/mkuser.default
热门标签
最新试卷