单选题Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()AEvents logBSystem logCUser Access logDAdmin Access log

单选题
Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()
A

Events log

B

System log

C

User Access log

D

Admin Access log


参考解析

解析: 暂无解析

相关考题:

Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? () A. Events logB. System logC. User Access logD. Admin Access log

日常故障处理时,在APG40中通过EventViewer,可以看到(). A.System logB.Security logC.Audit logD.Application log

下面哪个log文件是属于CORBA的A、ponnbi.logB、cmpi.logC、nbi.logD、server.log

下面那个log文件是属于PONNBI北向系统的A、ponnbi_wrapper.logB、server.logC、security.logD、inventory.log

日常故障处理时,在APG40中通过EventViewer,可以看到().A、System logB、Security logC、Audit logD、Application log

You have a server that runs Windows Server 2003 Service Pack 2 (SP2).  The server has the Routing and Remote Access service enabled and connects to the Internet by using a demand-dial connection. From the Routing and Remote Access snap-in, you open the properties of the server and enable the Log additional Routing and Remote Access information setting. You need to review the log file for issues related to the demand-dial connection.  Which file should you review?()A、%systemroot%/debug/netsetup.logB、%systemroot%/debug/oakley.logC、%systemroot%/tracing/ipnathlp.logD、%systemroot%/tracing/ppp.log

Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A、 Configure a directory service access audit policy. Increase the maximum size of the security log.B、 Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C、 Configure an object access audit policy for the directory. Increase the maximum size of the system log.D、 Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

过滤王用户上网日志是存放在哪个文件夹下的()A、access_logB、alert_logC、sys_logD、user_log

Weblogic server通过()日志文件来保证事务可靠性。A、TLOGB、Server logC、Domain LOGD、Access LOG

APG的事件查看器(EVENTVIEWER)可以查看下述哪些事件?()A、System LogB、Application LogC、Security LogD、User Log

A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()A、Application logB、File Replication logC、System logD、Security log

A technician is troubleshooting a user’s problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?()A、Com+.logB、System LogC、Security LogD、Application Log

What is the FIRST and most important step in system troubleshooting?()A、back up the system dataB、gather information about the problemC、try rebooting the system to see if that fixes the problemD、check the System Error Log or Event Log

A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()A、IIS logB、Application logC、System logD、Security log

An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem:   Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server  Check for Java errors from EJBs and servlets  Trace WebSphere Commerce Server subsystems and commands  Which of the following files should the administrator check to accomplish these steps?()A、error.logB、trace.logC、http_plugin.logD、servlet.logE、SystemOut.log

A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()A、Connection RequestsB、System ErrorsC、Enforcer EventsD、Enforcer Command Trace

A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()A、Perform a policy trace for the specific user and review the output to isolate the problem.B、Review the Events log.C、Review the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.D、Review the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.

Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A、Events logB、System logC、User Access logD、Admin Access log

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A、 Configure the system event log to Do not overwrite.B、 In IAS, in Remote Access Logging, enable the Authentication requests setting.C、 Configure the Remote Access server to Log all events.D、 Create a custom remote access policy and configure it for Authentication-Type.

Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()A、Power Users.B、Administrators.C、Performance Log Users.D、Performance Monitor Users.

Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You create a domain account named Admin1.  You need to configure the security for Admin1 to meet the following requirements:  (1)Allow Admin1 to monitor events in the system event log and the application event log  (2)Allow Admin1 to create and view counter logs in Performance Monitor  (3)Minimize the user rights assigned to Admin1  To which group should you add Admin1?()A、Power UsersB、AdministratorsC、Performance Log UsersD、Performance Monitor Users

单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2).  The server has the Routing and Remote Access service enabled and connects to the Internet by using a demand-dial connection. From the Routing and Remote Access snap-in, you open the properties of the server and enable the Log additional Routing and Remote Access information setting. You need to review the log file for issues related to the demand-dial connection.  Which file should you review?()A%systemroot%/debug/netsetup.logB%systemroot%/debug/oakley.logC%systemroot%/tracing/ipnathlp.logD%systemroot%/tracing/ppp.log

单选题Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()AEvents logBSystem logCUser Access logDAdmin Access log

单选题Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A Configure a directory service access audit policy. Increase the maximum size of the security log.B Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C Configure an object access audit policy for the directory. Increase the maximum size of the system log.D Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

单选题Your network consists of a single Active Directory domain that contains two domain controllers. Both domain controllers run Windows Server 2003 Service Pack 2 (SP2). Auditing of successful account logon events is enabled on all computers in the domain. You need to identify the last time a specific user logged on to the domain. What should you do? ()AExamine the System Event Log on the user’s computer.BExamine the System Event Log on both domain controllers.CExamine the Security Event Log on both domain controllers.DExamine the Application Event Log on the user’s computer.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A Configure the system event log to Do not overwrite.B In IAS, in Remote Access Logging, enable the Authentication requests setting.C Configure the Remote Access server to Log all events.D Create a custom remote access policy and configure it for Authentication-Type.

单选题Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()APower Users.BAdministrators.CPerformance Log Users.DPerformance Monitor Users.

单选题Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You create a domain account named Admin1.  You need to configure the security for Admin1 to meet the following requirements:  (1)Allow Admin1 to monitor events in the system event log and the application event log  (2)Allow Admin1 to create and view counter logs in Performance Monitor  (3)Minimize the user rights assigned to Admin1  To which group should you add Admin1?()APower UsersBAdministratorsCPerformance Log UsersDPerformance Monitor Users