单选题An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()A/var/adm/sulogB/etc/syslog.confC/etc/security/sysck.cfgD/etc/security/syslog.conf

单选题
An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()
A

/var/adm/sulog

B

/etc/syslog.conf

C

/etc/security/sysck.cfg

D

/etc/security/syslog.conf


参考解析

解析: 暂无解析

相关考题:

Asystemadministratorwasaskedtologinformationonpossiblesecuritybreachesonaserver.Whichfileshouldadditionalentriesbeaddedtocapturethisinformation?() A./var/adm/sulogB./etc/syslog.confC./etc/security/sysck.cfgD./etc/security/login.cfg

ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis() A./etc/security/limitsB./etc/security/mkuser.sysC./etc/security/privD./etc/security/user

Therootidissetsothatdirectloginisdisabled.Informationmustbereviewedrelatingtowhenrootaccesswasobtained.Inwhichofthefollowingfilesisthisinformationlocated?() A./var/adm/sulogB./var/adm/wtmpC./etc/security/userD./etc/security/failedlogin

Anadministratornoticesthe/filesystemis98%full.Whichofthefollowingfilescommonlygrowrapidly() A./var/adm/wtmpB./etc/security/failedloginC./smit.scriptD./proc

AIX中下面哪个文件包含了对用户密码的设置信息()。A、/etc/passwdB、/etc/security/passwdC、/etc/security/environD、/etc/security/user

A  user  wants  to  be  permanently  added  to  the  dba  group.  Which  of  the  following  commands  or processes can be used to accomplish this()A、chgrpB、chuserC、edit /etc/userD、edit /etc/security/group

Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A、/etc/security/userB、/etc/servicesC、/etc/inetd.confD、/etc/hosts.equiv

A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()A、/var/rmc/ctrmc.aclsB、/etc/ctrmc/rsct.aclsC、/etc/security/rsct.aclsD、/usr/sbin/rsct/cfg/ctrmc.acls

An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/syslog.conf

Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default

Which files are managed through the use of the file collection "HACMP_Files"?()A、The PowerHA Global ODM.B、System networking files including /etc/hosts, /etc/inetd.conf and /etc/servicesC、Security files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/groupD、User configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts

A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

The root id is set so that direct login is disabled.  Information must be reviewed relating to when root access was obtained.  In which of the following files is this information located?()A、 /var/adm/sulog B、 /var/adm/wtmp C、 /etc/security/user D、 /etc/security/failedlogin

An  administrator  notices  the  /  filesystem  is  98%  full.   Which  of  the  following  files  commonly  grow  rapidly()A、/var/adm/wtmpB、/etc/security/failedloginC、/smit.scriptD、/proc

A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/login.cfg

AIX中下面哪个文件包含了UID、HOME目录及shell信息()。A、/etc/passwdB、/etc/security/passwdC、/etc/security/environD、/etc/security/user

单选题Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()A/var/rmc/ctrmc.aclsB/etc/ctrmc/rsct.aclsC/etc/security/rsct.aclsD/usr/sbin/rsct/cfg/ctrmc.acls

单选题A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()Afwtmp  /etc/security/failedloginBcat /etc/security/failedloginCwhoDalog -f /etc/security/failedlogin -o

单选题Which files are managed through the use of the file collection "HACMP_Files"?()AThe PowerHA Global ODM.BSystem networking files including /etc/hosts, /etc/inetd.conf and /etc/servicesCSecurity files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/groupDUser configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts

单选题A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A/var/adm/sulogB/etc/syslog.confC/etc/security/sysck.cfgD/etc/security/login.cfg

单选题A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A/etc/security/limitsB/etc/security/mkuser.sysC/etc/security/privD/etc/security/user

单选题A  user  wants  to  be  permanently  added  to  the  dba  group.  Which  of  the  following  commands  or processes can be used to accomplish this()AchgrpBchuserCedit /etc/userDedit /etc/security/group

单选题An  administrator  notices  the  /  filesystem  is  98%  full.   Which  of  the  following  files  commonly  grow  rapidly()A/var/adm/wtmpB/etc/security/failedloginC/smit.scriptD/proc

单选题Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()A/etc/security/userB/etc/servicesC/etc/inetd.confD/etc/hosts.equiv

单选题The root id is set so that direct login is disabled.  Information must be reviewed relating to when root access was obtained.  In which of the following files is this information located?()A /var/adm/sulog B /var/adm/wtmp C /etc/security/user D /etc/security/failedlogin

单选题Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()A/etc/security/userB/etc/security/passwdC/etc/security/mkuser.sysD/etc/security/mkuser.default