Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor
Which of the following would be used to monitor unauthorized access to data files?()
- A、Performance Log and Alerts
- B、Event Viewer
- C、Security Configuration and Analysis
- D、IP Security Monitor
相关考题:
Which of the following commands would be used to display the IP address on a UNIX/Linux computer?()A、netstatB、ipconfigC、ifconfigD、dig
Which of the following would BEST optimize a computer that is heavily used? ()A、ScandiskB、DefragC、IndexingD、Chkdsk
Which of the following storage protocols would be suitable for transport across an IP network?()A、 SASB、 SCSIC、 iSCSID、 SATA
Which of the following devices would MOST likely integrate a DHCP server?()A、RouterB、HubC、SwitchD、Bridge
Following a system boot,the display indicates that previously detected hardware is missing. Which of the following commands would identify the missing hardware?()A、diagB、lscfgC、cfgmgrD、lsslot
单选题Which of the following terms would best describe the temperature at which a liquid boils at a given pressure?()ADegree of saturationBSaturation temperatureCSuperheated temperatureDDegree of superheat