单选题A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A/var/adm/sulogB/etc/syslog.confC/etc/security/sysck.cfgD/etc/security/login.cfg

单选题
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()
A

/var/adm/sulog

B

/etc/syslog.conf

C

/etc/security/sysck.cfg

D

/etc/security/login.cfg


参考解析

解析: 暂无解析

相关考题:

It is a kind of online service system, on which you can publish and exchange information with others who also are the members of the system.On which you can paste your articles and answer the questions asked by the members of the system and you can also look for help here.It isA.BBSB.WWWC.E-mailD.TELNET

● Most of the host operating system provides a way for a system administrator to manually configure the IP information needed by a host.Automated configuration methods, such as (72) , are required to solve the problem.(72)A.IPsecB.DHCPC.PPTPD.SOAP

You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.

Which information would you find using the CLI help function?() A. message of the dayB. tip of the dayC. explanation for specific system log error messagesD. explanation for specific traceoptions log messages

Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? () A. Events logB. System logC. User Access logD. Admin Access log

Most of the host operating system provides a way for a system administrator to manually configure the IP information needed by a host .Automated configuration methods such as ______, are required to solve the problem.A.IPsecB.DHCPC.PPTPD.SOAP

The document management of information system engineering supervision is an important work, among them, information the () is a general class file.A.supervision summary reportB.weekly reportC.meeting summaryD.daily log

Most of the host operating system provides a way for a system administrator to manually configure the IP information needed by a host. Automated configuration methods, such as (), are required to solve the problem.A.IPSecB.DHCPC.PPTPD.SOAP

A system administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location?()A、/tmp/conslogB、/etc/console.logC、/var/adm/ras/conslogD、/var/ras/console.log

What is the FIRST and most important step in system troubleshooting?()A、back up the system dataB、gather information about the problemC、try rebooting the system to see if that fixes the problemD、check the System Error Log or Event Log

A System p administrator suspects they are receiving an error from one of their nightly cron jobs. The  job is: 0 1 * * * /usr/local/bin/nightlycheck.pl Where should the administrator first look for errors reported by  this cron job()A、/var/log/syslog.outB、var/log/cron.logC、/var/spool/cron/logsD、mail

A system administrator has been asked to install an APAR but wants to be able to easily remove it. Which install option should be used?()A、applyB、cleanupC、commitD、reject

An administrator requires a summary of current configuration for each system. This is needed for an  audit trail.  Which of the following will provide this information()A、configassistB、prtconfC、IsattrD、listdgrp

An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/syslog.conf

A system administrator decides to review the system error log after installing new hardware. Which of the following is the correct command to use?()A、errptB、syslogC、prtdiagD、errlogger

An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()A、auditB、syslogC、TCBD、sysck

A system administrator has been asked to lock a specific login account. Which of the following commands is used to accomplish this?()A、pwdckB、usrckC、chuserD、rmuser

A System p administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down.  Where should the system administrator look for the console log, assuming it is in the default location()A、/var/log/conslogB、/var/log/console.logC、/var/adm/ras/conslogD、/var/ras/console.log

A system administrator has been asked to document the hardware configuration of a system. Which command can be used to assist in this task?()A、lscfgB、mkdevC、lslppD、cfgmgr

A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/login.cfg

Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A、Events logB、System logC、User Access logD、Admin Access log

You are maintaining your database in Oracle10g. You are not using the recovery catalog to maintain the backup information of your database. Which file can be used as a repository to store information regarding the RMAN backup?()A、 online redo log filesB、 alert log filesC、 control fileD、 datafiles associated with the SYSTEM tablespace

单选题Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()AEvents logBSystem logCUser Access logDAdmin Access log

单选题You are maintaining your database in Oracle10g. You are not using the recovery catalog to maintain the backup information of your database. Which file can be used as a repository to store information regarding the RMAN backup?()A online redo log filesB alert log filesC control fileD datafiles associated with the SYSTEM tablespace

单选题An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()A/var/adm/sulogB/etc/syslog.confC/etc/security/sysck.cfgD/etc/security/syslog.conf

单选题A system administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location?()A/tmp/conslogB/etc/console.logC/var/adm/ras/conslogD/var/ras/console.log

单选题A System p administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down.  Where should the system administrator look for the console log, assuming it is in the default location()A/var/log/conslogB/var/log/console.logC/var/adm/ras/conslogD/var/ras/console.log