单选题An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.  Which of the following AIX component accomplishes this()AauditBsyslogCTCBDsysck

单选题
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.  Which of the following AIX component accomplishes this()
A

audit

B

syslog

C

TCB

D

sysck


参考解析

解析: 暂无解析

相关考题:

“敏感探测区域”的英文写法( )A.Sensitive area detectionB.Sensitive detection areaC.Sensitive detion areaD.Sensitive area detion

1f someone asked me to be in a movie,l'd say yes.(对划线部分提问)_________ would you_________ if someone asked you_________ _________in a movie?

You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

Which two statements about the best effort model for QoS are true?()A、delay sensitive packets are given preferential treatmentB、the default policy identifies a delay sensitive class and default classC、the default policy identifies a delay sensitive class, best effort class, and default classD、the model is highly scalableE、the model is still predominant on the internet F the model provides guaranteed service

An administrator suspects that an incorrect POTS line is carrying the DSL signal. Which of thefollowing will help diagnose this issue?()A、MultimeterB、Toner probeC、Protocol analyzerD、Butt set

Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A、dig company.com nsB、ipconfig/allC、ifconfig-aD、dig company.com mx

An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()A、auditB、syslogC、TCBD、sysck

A System p administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect.  Which of the following commands can be used to determine the block size of the backup tape ()A、ddB、tarC、cpioD、restore

Users complain they cannot communicate with a server.  The system administrator suspects there may be a problem with the Ethernet adapter or with the way it is configured.  Which command can be run to verify the adapter is configured correctly?()A、netstat -inB、ifconfig -aC、arp -aD、cfgmgr

A system administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect. Which of the following commands can be used to determine the block size of the backup tape?()A、ddB、tarC、cpioD、restore

A system administrator is monitoring a system that has recently shown a decrease in performance. The administrator suspects there is an overload of traffic on a single Ethernet adapter. Which of the following commands is best to identify a possible overload of the Ethernet adapter?()A、pingB、iostatC、netstatD、ifconfig

A system administrator is monitoring a system that has recently shown a decrease in performance.The administrator suspects that the system may be low on memory and may be paging excessively.Which of the following commands is best to identify a possible paging problem?()A、iostatB、netstatC、psD、vmstat

An administrator trying to restore a backup from tape encounters read errors. The administrator suspects that it could be an issue with the block device.  What is the appropriate method to resolve this issue?()  A、Set the block size to 0.B、Read the tape using the tctl command.C、Use the ’cpio’ command to override tape device settings.D、Run the ’dd’ command to identify the block size from the tape.

An administrator just completed an AIX installation but suspects that not all filesets installed completely. Which of the following commands would verify that all filesets are completely installed?()A、installp -EB、lslpp -EC、lppchk -cD、instfix -c

An administrator suspects problems on a SCSI hard disk, but upon running diagnostics, no errors were found. What must be done to check the condition of the drive?()A、Run diag and select the 'Certify Media' task.B、Perform a read and write test on the disk and monitor errorlog.C、Update the disk firmware to the latest level and monitor errorlog.D、Format the disk to ensure bad blocks are omitted from the disk layout.

You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'. B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file. E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'. F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

“敏感探测区域”的英文写法()A、Sensitive area detectionB、Sensitive detection areaC、Sensitive detion areaD、Sensitive area detion

单选题A system administrator just completed an AIX installation but suspects that not all filesets installed completely. Which command should be run to verify that all filesets are completely installed?()AinstallpBlslppClppchkDoslevel

单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()Asystem /vBwinnt /sCsfc /scannowDchkdsk /f

单选题A System p administrator suspects they are receiving an error from one of their nightly cron jobs. The  job is: 0 1 * * * /usr/local/bin/nightlycheck.pl Where should the administrator first look for errors reported by  this cron job()A/var/log/syslog.outBvar/log/cron.logC/var/spool/cron/logsDmail

多选题Which two statements about the best effort model for QoS are true?()Adelay sensitive packets are given preferential treatmentBthe default policy identifies a delay sensitive class and default classCthe default policy identifies a delay sensitive class, best effort class, and default classDthe model is highly scalableEthe model is still predominant on the internet F the model provides guaranteed service

单选题The server administrator discovers that a server, which has not been patched, is runningextremely slow and suspects that the server may have been compromised. Which of the following commands should the administrator use to check the number of network connections the server is making?()AnetstatBpingCnslookupDgrep

单选题A system administrator suspects that there were problems with the AIX installation on a pSeries server. Which of the following commands can be used, with the appropriate flags, to view the BOS installation output files?()AalogBerrptClscfgDinstallp

单选题You are developing an application that runs by using the credentials of the end user. Only users who are members of the Administrator group get permission to run the application. You write the following security code to protect sensitive data within the application.bool isAdmin=false;  WindowsBuiltInRole role=WindowsBuiltInRole.Administrator; ......  if(!isAdmin)          throw new Exception("User not permitted");   You need to add a code segment to this security code to ensure that the application throws an exception if a user is not a member of the Administrator group. Which code segment should you use?()A AB BC CD D