单选题A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A/var/adm/sulogB/etc/syslog.confC/etc/security/sysck.cfgD/etc/security/login.cfg
单选题
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()
A
/var/adm/sulog
B
/etc/syslog.conf
C
/etc/security/sysck.cfg
D
/etc/security/login.cfg
参考解析
解析:
暂无解析
相关考题:
It is a kind of online service system, on which you can publish and exchange information with others who also are the members of the system.On which you can paste your articles and answer the questions asked by the members of the system and you can also look for help here.It isA.BBSB.WWWC.E-mailD.TELNET
● Most of the host operating system provides a way for a system administrator to manually configure the IP information needed by a host.Automated configuration methods, such as (72) , are required to solve the problem.(72)A.IPsecB.DHCPC.PPTPD.SOAP
You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.
Which information would you find using the CLI help function?() A. message of the dayB. tip of the dayC. explanation for specific system log error messagesD. explanation for specific traceoptions log messages
Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? () A. Events logB. System logC. User Access logD. Admin Access log
Most of the host operating system provides a way for a system administrator to manually configure the IP information needed by a host .Automated configuration methods such as ______, are required to solve the problem.A.IPsecB.DHCPC.PPTPD.SOAP
The document management of information system engineering supervision is an important work, among them, information the () is a general class file.A.supervision summary reportB.weekly reportC.meeting summaryD.daily log
Most of the host operating system provides a way for a system administrator to manually configure the IP information needed by a host. Automated configuration methods, such as (), are required to solve the problem.A.IPSecB.DHCPC.PPTPD.SOAP
A system administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location?()A、/tmp/conslogB、/etc/console.logC、/var/adm/ras/conslogD、/var/ras/console.log
What is the FIRST and most important step in system troubleshooting?()A、back up the system dataB、gather information about the problemC、try rebooting the system to see if that fixes the problemD、check the System Error Log or Event Log
A System p administrator suspects they are receiving an error from one of their nightly cron jobs. The job is: 0 1 * * * /usr/local/bin/nightlycheck.pl Where should the administrator first look for errors reported by this cron job()A、/var/log/syslog.outB、var/log/cron.logC、/var/spool/cron/logsD、mail
A system administrator has been asked to install an APAR but wants to be able to easily remove it. Which install option should be used?()A、applyB、cleanupC、commitD、reject
An administrator requires a summary of current configuration for each system. This is needed for an audit trail. Which of the following will provide this information()A、configassistB、prtconfC、IsattrD、listdgrp
An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/syslog.conf
A system administrator decides to review the system error log after installing new hardware. Which of the following is the correct command to use?()A、errptB、syslogC、prtdiagD、errlogger
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()A、auditB、syslogC、TCBD、sysck
A system administrator has been asked to lock a specific login account. Which of the following commands is used to accomplish this?()A、pwdckB、usrckC、chuserD、rmuser
A System p administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location()A、/var/log/conslogB、/var/log/console.logC、/var/adm/ras/conslogD、/var/ras/console.log
A system administrator has been asked to document the hardware configuration of a system. Which command can be used to assist in this task?()A、lscfgB、mkdevC、lslppD、cfgmgr
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/login.cfg
Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A、Events logB、System logC、User Access logD、Admin Access log
You are maintaining your database in Oracle10g. You are not using the recovery catalog to maintain the backup information of your database. Which file can be used as a repository to store information regarding the RMAN backup?()A、 online redo log filesB、 alert log filesC、 control fileD、 datafiles associated with the SYSTEM tablespace
单选题Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()AEvents logBSystem logCUser Access logDAdmin Access log
单选题You are maintaining your database in Oracle10g. You are not using the recovery catalog to maintain the backup information of your database. Which file can be used as a repository to store information regarding the RMAN backup?()A online redo log filesB alert log filesC control fileD datafiles associated with the SYSTEM tablespace
单选题An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()A/var/adm/sulogB/etc/syslog.confC/etc/security/sysck.cfgD/etc/security/syslog.conf
单选题A system administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location?()A/tmp/conslogB/etc/console.logC/var/adm/ras/conslogD/var/ras/console.log
单选题A System p administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location()A/var/log/conslogB/var/log/console.logC/var/adm/ras/conslogD/var/ras/console.log