单选题A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()Afwtmp  /etc/security/failedloginBcat /etc/security/failedloginCwhoDalog -f /etc/security/failedlogin -o

单选题
A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()
A

fwtmp < /etc/security/failedlogin

B

cat /etc/security/failedlogin

C

who

D

alog -f /etc/security/failedlogin -o


参考解析

解析: 暂无解析

相关考题:

Asystemadministratorwasaskedtologinformationonpossiblesecuritybreachesonaserver.Whichfileshouldadditionalentriesbeaddedtocapturethisinformation?() A./var/adm/sulogB./etc/syslog.confC./etc/security/sysck.cfgD./etc/security/login.cfg

ASystempadministratorisinvestigatingapossiblesecuritybreechandwantstoreviewinformationaboutfailedloginattemptstothesystem.Whichofthefollowingcommandswillshowthis() A.fwtmp/etc/security/failedloginB.cat/etc/security/failedloginC.whoD.alog-f/etc/security/failedlogin-o

When configuring Cisco IOS login enhancements for virtual connections, what is the "quiet period"?()A、The period of time in which virtual login attempts are blocked, following repeated failed login attemptsB、The period of time in which virtual logins are blocked as security services fully initializeC、A period of time when no one is attempting tolog inD、The period of time between successive login attempts

A  user  wants  to  be  permanently  added  to  the  dba  group.  Which  of  the  following  commands  or processes can be used to accomplish this()A、chgrpB、chuserC、edit /etc/userD、edit /etc/security/group

Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A、/etc/security/userB、/etc/servicesC、/etc/inetd.confD、/etc/hosts.equiv

A System p administrator has created a customized security profile using AIX Security Expert.  Which of the following commands will apply this to a system()A、aixpert -f mysec.xmlB、aixpert -a mysec.xmlC、chsec -f mysec.xmlD、chsec -a mysec.xml

For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()A、Strategic security planningB、Disaster recoveryC、Implementation securityD、Operations security

An administrator is planning to bring a newly purchased server online. Which of the following should the administrator do FIRST?()A、Follow the pre-installation plan and procedures.B、Review the system logs to check for errors.C、Notify all users that the old system will be taken offline.D、Apply all security updates to the system.

A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/syslog.conf

Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default

Which files are managed through the use of the file collection "HACMP_Files"?()A、The PowerHA Global ODM.B、System networking files including /etc/hosts, /etc/inetd.conf and /etc/servicesC、Security files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/groupD、User configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts

A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

The root id is set so that direct login is disabled.  Information must be reviewed relating to when root access was obtained.  In which of the following files is this information located?()A、 /var/adm/sulog B、 /var/adm/wtmp C、 /etc/security/user D、 /etc/security/failedlogin

An  administrator  notices  the  /  filesystem  is  98%  full.   Which  of  the  following  files  commonly  grow  rapidly()A、/var/adm/wtmpB、/etc/security/failedloginC、/smit.scriptD、/proc

A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/login.cfg

单选题A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A/var/adm/sulogB/etc/syslog.confC/etc/security/sysck.cfgD/etc/security/login.cfg

单选题A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A/etc/security/limitsB/etc/security/mkuser.sysC/etc/security/privD/etc/security/user

单选题When configuring Cisco IOS login enhancements for virtual connections, what is the "quiet period"?()AThe period of time in which virtual login attempts are blocked, following repeated failed login attemptsBThe period of time in which virtual logins are blocked as security services fully initializeCA period of time when no one is attempting tolog inDThe period of time between successive login attempts

单选题A  user  wants  to  be  permanently  added  to  the  dba  group.  Which  of  the  following  commands  or processes can be used to accomplish this()AchgrpBchuserCedit /etc/userDedit /etc/security/group

单选题For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()AStrategic security planningBDisaster recoveryCImplementation securityDOperations security

单选题An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()A/var/adm/sulogB/etc/syslog.confC/etc/security/sysck.cfgD/etc/security/syslog.conf

单选题Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A/etc/security/userB/etc/servicesC/etc/inetd.confD/etc/hosts.equiv

单选题A System p administrator has created a customized security profile using AIX Security Expert.  Which of the following commands will apply this to a system()Aaixpert -f mysec.xmlBaixpert -a mysec.xmlCchsec -f mysec.xmlDchsec -a mysec.xml

单选题The root id is set so that direct login is disabled.  Information must be reviewed relating to when root access was obtained.  In which of the following files is this information located?()A /var/adm/sulog B /var/adm/wtmp C /etc/security/user D /etc/security/failedlogin

单选题A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()APermissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.BIncrease the number of licenses; using smit chaili censeCChange the Maximum number of PROCESSES allowed per user variable; using smit chgsys.DChange User can logi field from false to true: using smit chuser.

单选题Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()A/etc/security/userB/etc/security/passwdC/etc/security/mkuser.sysD/etc/security/mkuser.default