单选题An administrator is investigating an incident where an unauthorized user gained access to a servera nd modified HR files.The administrator has a tested theory as to how the user accomplished this.Which of the following actions should the administrator take NEXT?()APerform a root cause analysis.BImplement a change to the servers.CEstablish a plan of action to resolve the issue.DQuestion users prior to implementing the solution.

单选题
An administrator is investigating an incident where an unauthorized user gained access to a servera nd modified HR files.The administrator has a tested theory as to how the user accomplished this.Which of the following actions should the administrator take NEXT?()
A

Perform a root cause analysis.

B

Implement a change to the servers.

C

Establish a plan of action to resolve the issue.

D

Question users prior to implementing the solution.


参考解析

解析: 暂无解析

相关考题:

Which of the following describes the location where an administrator would terminate a bundle ofCAT5e cables?() A.SwitchB.Smart jackC.RouterD.Patch panel

A system administrator types the command to change the hostname of a router. Where on the Cisco IFS is that change stored? () A. NVRAMB. RAMC. FLASHD. ROME. PCMCIA

A system administrator types the command to change the hostname of a router. Where on the Cisco IFS is that change stored?() A.NVRAMB.RAMC.FLASHD.ROME.PCMCIA

What are three factors a network administrator must consider before implementing Netflow in the network?()A、CPU utilizationB、where Netflow data will be sentC、number of devices exporting Netflow dataD、port availabilityE、SNMP versionF、WAN encapsulation

A system administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location?()A、/tmp/conslogB、/etc/console.logC、/var/adm/ras/conslogD、/var/ras/console.log

Which service component in the wireless operate phase helps isolate and resolve an incident?()A、change managementB、configuration managementC、incident managementD、acceptance test plan

A system administrator types the command to change the hostname of a router. Where on the Cisco IFS is that change stored? ()A、NVRAMB、RAMC、FLASHD、ROME、PCMCIA

Which of the following describes the location where an administrator would terminate a bundle ofCAT5e cables?()A、SwitchB、Smart jackC、RouterD、Patch panel

An administrator is investigating an incident where an unauthorized user gained access to a servera nd modified HR files.The administrator has a tested theory as to how the user accomplished this.Which of the following actions should the administrator take NEXT?()A、Perform a root cause analysis.B、Implement a change to the servers.C、Establish a plan of action to resolve the issue.D、Question users prior to implementing the solution.

he system administrator is making system wide changes to a server, which will add to the PATH variable for the server environment.  Where is the PATH variable found for the system?()A、/profileB、/etc/envpathC、/etc/profileD、/etc/environment

A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

A System p administrator suspects they are receiving an error from one of their nightly cron jobs. The  job is: 0 1 * * * /usr/local/bin/nightlycheck.pl Where should the administrator first look for errors reported by  this cron job()A、/var/log/syslog.outB、var/log/cron.logC、/var/spool/cron/logsD、mail

An AIX system administrator has setup disk quotas.  Where can the reports be found on the system?()A、/var/adm/acct/sum B、/var/adm/ras C、/usr/sbin/acct D、/var/adm/wtmp

A system administrator is currently working on a problem with IBM Support. The administrator feels that their expectations are not being met on this problem. What is the IBM recommended procedure to ensure that the request is handled appropriately?()A、Request to change the severity to 1B、Request to speak to the Duty ManagerC、Request to escalate the problem to developmentD、Request IBM to close the incident and reopen the incident with another call.

An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A、/tmpB、/var/preserveC、/var/tmp/$USERD、$HOME/.vi

The system administrator is making system wide changes to a server, which will add to the PATH variable for the server environment. Where is the PATH variable found for the system?()A、/profileB、/etc/envpathC、/etc/profileD、/etc/environment

Which statements are true regarding the creation of an incident package file by using the EM WorkbenchSupport()A、You can add SQL test cases to the incident package.B、You can add or remove the trace files to the package.C、You cannot create an incremental incident package when the physical files are purged from the ADR.D、You can create the incremental incident package ZIP file for new or modified diagnostic information for theincident package already created.

Which statement is true regarding the retention policy for the incidents accumulated in the AutomaticDiagnostic Repository (ADR)?()A、The incident metadata is purged when the problem is resolved and the DBA closes the SRB、The incident files and dumps are not retained in the ADR for the manually created incidentsC、The incident files are retained but the incident metadata is purged when the problem is resolved and the DBA closes the SRD、The default setting is for one year after which the incident metadata is purged from the ADR and the files are retained for one month

多选题Which statements are true regarding the creation of an incident package file by using the EM Workbench Support?()AYou can add or remove the trace files to the package.BYou can create the incremental incident package ZIP file for new or modified diagnostic information for the incident package already created.CYou can add SQL test cases to the incident package.DYou cannot create an incremental incident package when the physical files are purged rom the ADR.

单选题Where does the Password Manager keep the encrypted administrator passwords?()AIn the WebSphere Commerce instance configuration fileBIn the Password Manager databaseCIn the WebSphere Commerce databaseDIn the WebSphere Application Server repositoryEIn the Password Manager XML file

单选题A system administrator types the command to change the hostname of a router. Where on the Cisco IFS is that change stored?()ANVRAMBRAMCFLASHDROMEPCMCIA

单选题An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A/tmpB/var/preserveC/var/tmp/$USERD$HOME/.vi

单选题A System p administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down.  Where should the system administrator look for the console log, assuming it is in the default location()A/var/log/conslogB/var/log/console.logC/var/adm/ras/conslogD/var/ras/console.log

单选题A network administrator repeatedly receives support calls about network issues. After investigating the issues, the administrator finds that the source NAT pool is running out of addresses.To be notified that the pool is close to exhaustion, what should the administrator configure?()AUse the pool-utilization-alarm raise-threshold under the security nat source stanza.BUse a trap-group with a category of services under the SNMP stanza.CUse an external script that will run a show command on the SRX Series device to see when the pool is close to exhaustion.DConfigure a syslog message to trigger a notification when the pool is close to exhaustion.

单选题Which statement is true regarding the retention policy for the incidents accumulated in the AutomaticDiagnostic Repository (ADR)?()AThe incident metadata is purged when the problem is resolved and the DBA closes the SRBThe incident files and dumps are not retained in the ADR for the manually created incidentsCThe incident files are retained but the incident metadata is purged when the problem is resolved and the DBA closes the SRDThe default setting is for one year after which the incident metadata is purged from the ADR and the files are retained for one month

单选题he system administrator is making system wide changes to a server, which will add to the PATH variable for the server environment.  Where is the PATH variable found for the system?()A/profileB/etc/envpathC/etc/profileD/etc/environment