单选题A System p administrator has created a customized security profile using AIX Security Expert. Which of the following commands will apply this to a system()Aaixpert -f mysec.xmlBaixpert -a mysec.xmlCchsec -f mysec.xmlDchsec -a mysec.xml
单选题
A System p administrator has created a customized security profile using AIX Security Expert. Which of the following commands will apply this to a system()
A
aixpert -f mysec.xml
B
aixpert -a mysec.xml
C
chsec -f mysec.xml
D
chsec -a mysec.xml
参考解析
解析:
暂无解析
相关考题:
A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface. Which of the following files would show the commands that have been performed from within smit and their resulting output()A、/smit.logB、/smit.scriptC、/var/log/smit.logD、/.history
An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()A、odmgetB、odmaddC、odmshowD、odmcreate
An administrator has just imported a shred Volume Group that had been created on another system in the cluster. In order for the shred volume to be used in the cluster, what is the most important step for the administrator to take first?() A、 Change the quorum required to false.B、 Change the Volume Group auto vary on to yes, and then vary off the Volume Group.C、 Change the auto vary on value of the Volume Group to no, and then vary off the volume group.D、 Set the Volume Group major number to the same value that the Volume Group had on the system on which it was created.
An administrator is troubleshooting issues on an application server.After a root cause analysis,the administrator has determined that there were some unauthorized logins to the server.Which of the following locations would BEST help to determine details about the unauthorized logins?()A、Active DirectoryB、DHCP logsC、Security logsD、System logs
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()A、fwtmp /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o
A System p administrator has just configured logging system messages with the syslogd daemon. At boot time which file starts the syslog daemon()A、/etc/rc.tcpipB、/sbin/rc.bootC、/etc/rc.netD、/etc/rc.d
A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A、Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B、Increase the number of licenses; using smit chaili censeC、Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D、Change User can logi field from false to true: using smit chuser.
A System p administrator has been instructed to verify that all filesets have all required requisitesand are completely installed. Which of the following commands will provide this information()A、lslppB、lppchkC、geninstallD、installp
A System p administrator has just installed a new technology level, but "oslevel -r" does not show the expected technology level. Which of the following commands would determine which filesets are downlevel()A、lppchkB、instfixC、oslevelD、installp
A System p administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location()A、/var/log/conslogB、/var/log/console.logC、/var/adm/ras/conslogD、/var/ras/console.log
A System p administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect. Which of the following commands can be used to determine the block size of the backup tape ()A、ddB、tarC、cpioD、restore
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user
A system administrator has a server that is performing poorly. The vmstat command identifies that high CPU usage is the problem. Which of the following commands can be used to identify the eight most active processes running on the server?()A、ps -ef -t8B、sar -u -p 8C、vmstat -t 8D、topas -p8 -n0 -d0
A System p administrator in a manufacturing customer plans to migrate an AIX 5.2 system to a new LPAR on an existing System p using VIOS. Which of the following must be completed prior to this migration ()A、Upgrade system firmware to latest levelB、Upgrade to AIX 5.3C、Upgrade HMC to version 6.1D、Convert rootvg filesystems to JFS2
A customer currently has five partitioned POWER4 systems and is adding new systems. When the pSeries technical specialist introduces the first p5 system with CoD into this environment, how should the HMC be handled?()A、Order a new HMC to support the p5 system.B、Attach the new p5 system to the existing HMC.C、Upgrade the existing HMC to accommodate both the POWER4 and p5 systems.D、Do nothing. This system does not require an HMC.
A System p administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this()A、sysckB、usrckC、lssecD、lsuser
The System Administrator has set up shared processors on three partitions in the p5 590 system. The shared processors have been set to uncapped. The system administrator notices that the logical partition is acting like it is capped. What is the most probable cause?()A、The uncapped weight has been set to 0.B、The uncapped weight has been set to 128.C、The processing unit for that partition was set to .1 processing units. A full processor was assigned.D、The processing unit for that partition was set to 0.50 processing units. A full processor was assigned.
单选题A System p administrator has increased the size of the logical volume lv00. The administrator now wants to enlarge the filesystem /fs00 that is mounted on lv00 to the same size as lv00. Which of the following commands will show the administrator the number of blocks to use when increasing the size of the filesystem /fs00()Alslv /fs00Blsfs -q /fs00Clscfg -v lv00Dlsattr -El lv00
单选题A System p administrator is looking at changing attributes of a logical volume. Which of the following must be defined when it is created()Aplacement of the logical volumeBstripe size of the logical volumeCinter-disk policy of the logical volumeDintra-disk policy of the logical volume
单选题A System p administrator plans to install a new system with AIX 5.3 TL5 using a NIM server. Which of the following provide post install diagnostics()ASPOTBlpp_sourceCmksysbDinstall CD
单选题An administrator has just imported a shred Volume Group that had been created on another system in the cluster. In order for the shred volume to be used in the cluster, what is the most important step for the administrator to take first?()A Change the quorum required to false.B Change the Volume Group auto vary on to yes, and then vary off the Volume Group.C Change the auto vary on value of the Volume Group to no, and then vary off the volume group.D Set the Volume Group major number to the same value that the Volume Group had on the system on which it was created.
单选题A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A/etc/security/limitsB/etc/security/mkuser.sysC/etc/security/privD/etc/security/user
单选题A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface. Which of the following files would show the commands that have been performed from within smit and their resulting output()A/smit.logB/smit.scriptC/var/log/smit.logD/.history
单选题A System p administrator has just configured logging system messages with the syslogd daemon. At boot time which file starts the syslog daemon()A/etc/rc.tcpipB/sbin/rc.bootC/etc/rc.netD/etc/rc.d
单选题A System p administrator has determined that a recently applied APAR needs to be removed. Which of the following installp options will remove the APAR()AcleanupBuninstallCdeinstallDreject
单选题A System p administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location()A/var/log/conslogB/var/log/console.logC/var/adm/ras/conslogD/var/ras/console.log
单选题The System Administrator has set up shared processors on three partitions in the p5 590 system. The shared processors have been set to uncapped. The system administrator notices that the logical partition is acting like it is capped. What is the most probable cause?()AThe uncapped weight has been set to 0.BThe uncapped weight has been set to 128.CThe processing unit for that partition was set to .1 processing units. A full processor was assigned.DThe processing unit for that partition was set to 0.50 processing units. A full processor was assigned.