单选题An administrator performs an audit on the /usr filesystem and finds the following permissions: -rwsr-xr-x 1 root sys 514288 Jun 18 09:40 /usr/local/bin/nmon Which of the following methods can the administrator use to remove a potential security risk()Arm /usr/local/bin/nmonBchmod u-s /usr/local/bin/nmonCReinstall the file from the appropriate filesetDchmod go-rx /usr/local/bin/nmon
单选题
An administrator performs an audit on the /usr filesystem and finds the following permissions: -rwsr-xr-x 1 root sys 514288 Jun 18 09:40 /usr/local/bin/nmon Which of the following methods can the administrator use to remove a potential security risk()
A
rm /usr/local/bin/nmon
B
chmod u-s /usr/local/bin/nmon
C
Reinstall the file from the appropriate fileset
D
chmod go-rx /usr/local/bin/nmon
参考解析
解析:
暂无解析
相关考题:
If a kill -9 is performed on the clstrmgrES process, the default action is to halt the system. Tochange the default action to do something other then halting the system, which of the following files must be modified?() A、 /usr/es/sbin/cluster/etc/clexit.rcB、 /usr/es/sbin/cluster/etc/hacmp.termC、 /usr/es/sbin/cluster/etc/rc.clusterD、 /usr/es/sbin/cluster/etc/rc.shutdown
You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
A system administrator wants to run a script called myscript, but does not want to see the errors that might be generated by the script. How would this be accomplished?()A、/usr/local/bin/myscript /dev/nullB、/usr/local/bin/myscript /dev/nullC、/usr/local/bin/myscript 2 /dev/nullD、/usr/local/bin/myscript 1 /dev/null
A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.
Which of the following contain the BOS ODM files()A、/usr/objreposB、/usr/lpp/objreposC、/usr/bin/objreposD、/etc/objrepos
An administrator requires a summary of current configuration for each system. This is needed for an audit trail. Which of the following will provide this information()A、configassistB、prtconfC、IsattrD、listdgrp
While using the smit install_remove menus to remove some filesets the system administrator notices the /usr filesystem is now unnecessarily large. Which of the following actions will reduce the size of the /usr filesystem?()A、Backup, unmount, remove, recreate and restore the filesystem.B、Boot from mksysb tape and select Shrink filesystems on restore.C、Unmount, run defragfs /usr and the reducefs -size XXX /usr commands.D、Update /etc/filesystems with the desired size for /usr and reboot the system.
A system administrator issued the errpt command and had no results. The system administrator determined that error logging was turned off. Which of the following commands should be used to start logging system errors?()A、/usr/bin/errmsgB、/usr/lib/errdemonC、/usr/lib/errloggerD、/usr/bin/errinstall
A system administrator has just finished upgrading a system to AIX 5.2. If there are future problems, the system administrator would like to add an entry to the AIX errorlog to record this event. Which of the following commands can be issued for this purpose?()A、/usr/bin/errmsg "System upgraded to AIX 5.2"B、/usr/bin/errlog "System upgraded to AIX 5.2"C、/usr/bin/errupdate "System upgraded to AIX 5.2"D、/usr/bin/errlogger "System upgraded to AIX 5.2"
An AIX system administrator wants to be able to monitor disk usage and to be able to control how much disk space can be used. Which command is run to obtain the desired output?()A、 /usr/bin/filemon B、 /usr/bin/startsrc C、 /usr/sbin/acct/startup D、 /usr/bin/df
You need to change the hostname and IP address of a server. Without manually editing all of the required files, which command can be run to restore a system configuration to an unconfigured state, ready to be reconfigured again restore a system configuration to an unconfigured state, ready to be reconfigured again? ()A、 /usr/sbin/sys-unconfigB、 /usr/sbin/unconfigC、 /sbin/ipconfigD、 /usr/sbin/set_parms initial
Your company has file servers located in an organizational unit named Payroll. The file servers contain payroll files located in a folder named Payroll. You create a GPO. You need to track which employees access the Payroll files on the file servers. What should you do() A、Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file servers, configureB、Enable the Audit object access option. Link the GPO to the domain. On the domain controllers, configure Auditing fC、Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit. On the file seD、Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file servers, config
Certkiller .com has organizational units in the Active Directory domain. There are 10 servers in the organizational unit called Security. As an administrator at Certkiller .com, you generate a Group Policy Object (GPO) and link it to the Security organizational unit. What should you do to monitor the network connections to the servers in Security organizational unit()A、Start the Audit Object Access optionB、Start the Audit System Events optionC、Start the Audit Logon Events optionD、Start the Audit process tracking optionE、All of the above
单选题A system administrator issued the errpt command and had no results. The system administrator determined that error logging was turned off. Which of the following commands should be used to start logging system errors?()A/usr/bin/errmsgB/usr/lib/errdemonC/usr/lib/errloggerD/usr/bin/errinstall
单选题An administrator needs to add the /usr/vac/bin directory to their PATH environment variable for the current session. Which of the following will accomplish this task()Apath=$path:/usr/vac/bin; export pathBpath.=/usr/vac/bin; export $pathCModify the path environment variable in /etc/profileDModify the path environment variable in /.profile
单选题You need to change the hostname and IP address of a server. Without manually editing all of the required files, which command can be run to restore a system configuration to an unconfigured state, ready to be reconfigured again restore a system configuration to an unconfigured state, ready to be reconfigured again? ()A /usr/sbin/sys-unconfigB /usr/sbin/unconfigC /sbin/ipconfigD /usr/sbin/set_parms initial
多选题You work as a database administrator for Certkiller .com. In your development environmentenvironment, the developers are responsible for modifying the table structure according to the application requirements. However, you want to keep track of the ALTER TABLE commands being executed by developers, so you enable auditing to achieve this objective. Which two views would you refer to find out the audit information?()ADBA_AUDIT_TRAILBDBA_AUDIT_SESSIONCDBA_FGA_AUDIT_TRAILDDBA_COMMON_AUDIT_TRAIL
单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A Enable audit object access and specify files and folders to monitor using Task Manager.B Enable audit policy change and specify files and folders to monitor using Windows Explorer.C Enable audit object access and specify files and folders to monitor using Windows Explorer.D Open Performance Monitor and monitor folder activity.
单选题You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()ATurn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.BTurn on auditing for objects in the Local Security Policy and Select 'Object Access'.CUse Windows Explorer to turn on auditing for the specific files. DHave the administrator for domains log you on as an administrator and enable auditing for a specific file.ETurn on auditing for objects in the Local Security Policy and Select 'Account Management'.FAllow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
单选题If a kill -9 is performed on the clstrmgrES process, the default action is to halt the system. Tochange the default action to do something other then halting the system, which of the following files must be modified?()A /usr/es/sbin/cluster/etc/clexit.rcB /usr/es/sbin/cluster/etc/hacmp.termC /usr/es/sbin/cluster/etc/rc.clusterD /usr/es/sbin/cluster/etc/rc.shutdown
单选题Which of the following contain the BOS ODM files()A/usr/objreposB/usr/lpp/objreposC/usr/bin/objreposD/etc/objrepos
单选题A system administrator has just finished upgrading a system to AIX 5.2. If there are future problems, the system administrator would like to add an entry to the AIX errorlog to record this event. Which of the following commands can be issued for this purpose?()A/usr/bin/errmsg System upgraded to AIX 5.2B/usr/bin/errlog System upgraded to AIX 5.2C/usr/bin/errupdate System upgraded to AIX 5.2D/usr/bin/errlogger System upgraded to AIX 5.2
单选题An AIX system administrator wants to be able to monitor disk usage and to be able to control how much disk space can be used. Which command is run to obtain the desired output?()A /usr/bin/filemon B /usr/bin/startsrc C /usr/sbin/acct/startup D /usr/bin/df
单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Confidential files are stored on a member server named TK1. The computer object for TK1 resides in an organizational unit (OU) named Confidential. A Group Policy object (GPO) named GPO1 is linked to the Confidential OU. To audit access to the confidential files, you enable auditing on all private folders on TK1. Several days later, you review the audit logs. You discover that auditing is not successful. You need to ensure that auditing occurs successfully. What should you do?()AStart the System Event Notification Service (SENS) on TK1.BStart the Error Reporting service on TK1.CModify the Default Domain Controllers GPO by selecting Success and Failure as the Audit Object Access setting.DModify GPO1 by selecting Success and Failure as the Audit Object Access setting.
单选题A system administrator wants to run a script called myscript, but does not want to see the errors that might be generated by the script. How would this be accomplished?()A/usr/local/bin/myscript /dev/nullB/usr/local/bin/myscript /dev/nullC/usr/local/bin/myscript 2 /dev/nullD/usr/local/bin/myscript 1 /dev/null