网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following logs contains information on overall performance and events not related to user authentication?()
A

Security

B

Audit

C

Application

D

System


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following logs contains information on overall performance and events not related to user authentication?()A SecurityB AuditC ApplicationD System” 相关考题
考题 Which of the following is a secure method of copying information over a public network?() A.SCPB.SMTPC.SNMPD.TFTP

考题 Which of the following words contains an inflectional morpheme? A.Disappear. B.Blacken. C.Oxen. D.Anti-pollution.

考题 Which of the following is true according to the passage? __________A.The National Salt Reduction Initiative aims to put pressure on food companies B.Parents of children don' t care much about the calorie information of fast food C.Parents will order the food that contains more salt for their children D.If people eat less salt every day, they will never suffer from heart disease

考题 Which of the following is a secure method of copying information over a public network?()A、SCPB、SMTPC、SNMPD、TFTP

考题 Which of the following logs contains information on overall performance and events not related to user authentication?()A、SecurityB、AuditC、ApplicationD、System

考题 An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A、The supporting documentationB、The vendor websiteC、The InternetD、The server event logs

考题 Which of the following BEST describes CAT5e?()A、Contains four pair of wires of various gaugeB、Contains two wires in a red fireproof jacketC、Contains four twisted pairs of wiresD、Contains eight wires within a thick jacket with a rip cord

考题 A server is having problems booting into the operating system.  Which of the following can provide important information to begin to trouble shoot the cause?()A、 System logsB、 Firmware updatesC、 POST messagesD、 Application logs

考题 Which of the following can limit cabling mistakes?()A、Proper labelingB、Asset managementC、Keeping good vendor logsD、Keeping up-to-date repair logs

考题 Which of the following commands should be used to show DNS information?()A、 traceB、 netstatC、 ifconfigD、 nslookup

考题 Which of the following commands can be used to review the system error logs?()A、 errpt -aB、 errpt -lC、 errdemon -lD、 syslogd -r

考题 Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()A、Software problems don't generate errors. B、The user is more knowledgeable about software. C、The system logs will provide useful information alone. D、Key information pertaining to the software may be uncovered.

考题 Which directory contains RSCT topology services logs?()A、/var/ha/logB、/var/ha/rsctC、/var/hacmp/logD、/var/hacmp/rsct

考题 Which of the following are TRUE about a store archive?()A、It is an XML file containing store data assetsB、It uses the same file format as a ZIP fileC、It contains file assets to create a store or siteD、It can easily be copied from one machine to anotherE、It can contain WebSphere Commerce instance configuration information

考题 Which of the following does the recover command not do?()  A、 Restore archived redo logs.B、 Apply archived redo logs.C、 Restore incremental backups.D、 Apply incremental backups.E、 Restore datafile images.

考题 You have an Exchange Server 2010 organization that contains Windows Mobile 5.0 devices. Your company plans to replace all mobile devices with Windows Mobile 6.5 devices.  You need to identify which users accessed their mailboxes by using Windows Mobile 5.0 devices in thepast month.  What should you do?()A、Create a Data Collector Set.B、Install and run the Exchange Server User Monitor (ExMon).C、Export and review the Internet Information Services (IIS) logs.D、Enable User Agent logging, and then review the agent logs.

考题 多选题Which of the following are TRUE about a store archive?()AIt is an XML file containing store data assetsBIt uses the same file format as a ZIP fileCIt contains file assets to create a store or siteDIt can easily be copied from one machine to anotherEIt can contain WebSphere Commerce instance configuration information

考题 单选题A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()A Backup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.B Uninstall the payroll software to ensure confidentiality.C Have the director remove sensitive data before the computer will be repaired.D Perform needed repairs while avoiding sensitive data.

考题 单选题Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()A Software problems don't generate errors. B The user is more knowledgeable about software. C The system logs will provide useful information alone. D Key information pertaining to the software may be uncovered.

考题 单选题You are adding redo logs to the Oracle database. Creating a new redo log adds information to which of the following Oracle resources? ()A Shared pool B Control file C SGA D PGA

考题 单选题To make audit information more productive, the DBA executes the following command before starting an auditoperation: SQL ALTER SYSTEM SET AUDIT_TRAIL=DB,EXTENDED SCOPE=SPFILE; Which statement is true regarding the audit record generated when auditing starts after restarting Thedatabase()A It contains only the plan for the SQL statement executed by the user.B It contains the SQL text executed by the user and the bind variables used with it.C It contains the plan and statistics associated with the SQL statement executed by the user.D It contains the plan for the SQL statement executed by the user and the bind variables used with it

考题 单选题A server is having problems booting into the operating system.  Which of the following can provide important information to begin to trouble shoot the cause?()A  System logsB  Firmware updatesC  POST messagesD  Application logs

考题 单选题When you are allowing RMAN to backup your archived redo log files,how does RMAN know which archived redo logs to back up from your archive log destination?()A RMAN keeps a list of archive logs in a text file.B The DBA must manually tell RMAN which archive logs to backup.C RMAN has access to target control file and/or catalog information.D RMAN looks at the ARCHIVE_LOG_DEST parameter of your target database and backs up all archive logs found.

考题 多选题Which of the following files cannot be backed up by RMAN?()ADatabase datafilesBControl filesCOnline redo logsDDatabase pfilesEArchived redo logs

考题 单选题Which directory contains RSCT topology services logs?()A /var/ha/logB /var/ha/rsctC /var/hacmp/logD /var/hacmp/rsct

考题 单选题An administrator has encountered a problem with a particular piece of software installed on the serverand begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A  The supporting documentationB  The vendors websiteC  The InternetD  The servers event logs

考题 单选题A server is having problems booting into the operating system. Which of the following can provide important information to begin to troubleshoot the cause?()A System logsB Firmware updatesC POST messagesD Application logs

考题 单选题An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A The supporting documentationB The vendor websiteC The InternetD The server event logs