单选题An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()A/var/adm/sulogB/etc/syslog.confC/etc/security/sysck.cfgD/etc/security/syslog.conf

单选题
An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()
A

/var/adm/sulog

B

/etc/syslog.conf

C

/etc/security/sysck.cfg

D

/etc/security/syslog.conf


参考解析

解析: 暂无解析

相关考题:

You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.

An administrator created a WebSphere Commerce instance but the site is not performing properly.  The log messages don’t give enough information to determine the problem.  Which tool is used to configure tracing of WebSphere Commerce?()A、WebSphere Commerce Configuration ManagerB、WebSphere Application Server Administrative ConsoleC、WebSphere Commerce Administration ConsoleD、WebSphere Commerce AcceleratorE、Command line

A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface.  Which of the following files would show the commands that have been performed from within smit and their resulting output()A、/smit.logB、/smit.scriptC、/var/log/smit.logD、/.history

Where do you find information about a missing redo log file?()A、trace fileB、audit trailC、control fileD、alert log fileE、event viewer

The production database has been functional for the last seven days. Because of application requirements, some of the initialization parameters were changed during run time without any comments. You have asked to find out the value of the parameters when the instance was started.Which source would you use to locate this information?()A、 Fixed viewsB、 The alert log fileC、 The parameter fileD、 The server parameter fileE、 Dynamic performance views

An administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface. Which file would show the commands that have been performed from within smit and their resulting output?()A、/smit.logB、/smit.scriptC、/var/log/smit.logD、/var/log/smit.script

A customer reports the optical drive is no longer responding. Which of the following questionsshould be asked FIRST?()A、“Did you log in with an administrator account?”B、“Have you been to any inappropriate websites?”C、“What have you changed since the optical drive worked properly?”D、“What has changed since the optical drive worked properly?”

A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/syslog.conf

An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()A、auditB、syslogC、TCBD、sysck

An administrator has been asked to look at the different types of Emulex host bus adapters that can be used in an x445 server.  From the following options, where can the most relevant information be found to assist in making a valid choice?()A、IBM RedbooksB、IBM Announcement LettersC、ServerProven websiteD、Configuration and Options Guide (COG)

A System p administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down.  Where should the system administrator look for the console log, assuming it is in the default location()A、/var/log/conslogB、/var/log/console.logC、/var/adm/ras/conslogD、/var/ras/console.log

How would an AIX administrator find information regarding smit menu definitions ()A、Use ODM commandsB、In the /smit.log fileC、In the /etc/environment fileD、In the/usr/lib/smit/menu.cfg file

A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/login.cfg

You work as a database administrator for Supportcenter.cn. You determine that archiving was not successful in one of thedestinators. You want to check the alert log file for more information on this.Which initialization parameter gives you the location of the alert log file?()A、USER_DUMP_DESTB、CORE_DUMP_DESTC、ALERT_LOG_DESTD、ALERT_DUMP_DESTE、TRACE_DUMP_DESTF、BACKGROUND_DUMP_DEST

单选题Where do you find information about a missing redo log file?()Atrace fileBaudit trailCcontrol fileDalert log fileEevent viewer

单选题A customer reports the optical drive is no longer responding. Which of the following questionsshould be asked FIRST?()A“Did you log in with an administrator account?”B“Have you been to any inappropriate websites?”C“What have you changed since the optical drive worked properly?”D“What has changed since the optical drive worked properly?”

单选题A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface.  Which of the following files would show the commands that have been performed from within smit and their resulting output()A/smit.logB/smit.scriptC/var/log/smit.logD/.history

单选题A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A/var/adm/sulogB/etc/syslog.confC/etc/security/sysck.cfgD/etc/security/login.cfg

单选题How would an AIX administrator find information regarding smit menu definitions ()AUse ODM commandsBIn the /smit.log fileCIn the /etc/environment fileDIn the/usr/lib/smit/menu.cfg file

单选题You are analyzing the components of the redo log mechanisms in your Oracle database. Which of the following purposes does the CKPT process serve?()AWrites buffers to disk BWrites current redo log number to datafile headers CWrites redo log information to disk DReads information into memory for users

单选题A System p administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down.  Where should the system administrator look for the console log, assuming it is in the default location()A/var/log/conslogB/var/log/console.logC/var/adm/ras/conslogD/var/ras/console.log

单选题An administrator created a WebSphere Commerce instance but the site is not performing properly.  The log messages don’t give enough information to determine the problem.  Which tool is used to configure tracing of WebSphere Commerce?()AWebSphere Commerce Configuration ManagerBWebSphere Application Server Administrative ConsoleCWebSphere Commerce Administration ConsoleDWebSphere Commerce AcceleratorECommand line

单选题An administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface. Which file would show the commands that have been performed from within smit and their resulting output?()A/smit.logB/smit.scriptC/var/log/smit.logD/var/log/smit.script

单选题You work as a database administrator for Supportcenter.cn. You determine that archiving was not successful in one of thedestinators. You want to check the alert log file for more information on this.Which initialization parameter gives you the location of the alert log file?()AUSER_DUMP_DESTBCORE_DUMP_DESTCALERT_LOG_DESTDALERT_DUMP_DESTETRACE_DUMP_DESTFBACKGROUND_DUMP_DEST

问答题题型:翻译 “Will it be possible to get me another ticket?” he asked hopefully.

问答题“Will it be possible to get me another ticket?” he asked hopefully.