Events log
System log
User Access log
Admin Access log
第1题:
日常故障处理时,在APG40中通过EventViewer,可以看到().
第2题:
Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements. What should your plan include?()
第3题:
Weblogic server通过()日志文件来保证事务可靠性。
第4题:
A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()
第5题:
What is the FIRST and most important step in system troubleshooting?()
第6题:
An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem: Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server Check for Java errors from EJBs and servlets Trace WebSphere Commerce Server subsystems and commands Which of the following files should the administrator check to accomplish these steps?()
第7题:
A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()
第8题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users. What should you do? ()
第9题:
Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: (1)Allow Admin1 to monitor events in the system event log and the application event log (2)Allow Admin1 to create and view counter logs in Performance Monitor (3)Minimize the user rights assigned to Admin1 To which group should you add Admin1?()
第10题:
Events log
System log
User Access log
Admin Access log
第11题:
Examine the System Event Log on the user’s computer.
Examine the System Event Log on both domain controllers.
Examine the Security Event Log on both domain controllers.
Examine the Application Event Log on the user’s computer.
第12题:
Power Users.
Administrators.
Performance Log Users.
Performance Monitor Users.
第13题:
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has the Routing and Remote Access service enabled and connects to the Internet by using a demand-dial connection. From the Routing and Remote Access snap-in, you open the properties of the server and enable the Log additional Routing and Remote Access information setting. You need to review the log file for issues related to the demand-dial connection. Which file should you review?()
第14题:
过滤王用户上网日志是存放在哪个文件夹下的()
第15题:
APG的事件查看器(EVENTVIEWER)可以查看下述哪些事件?()
第16题:
A technician is troubleshooting a user’s problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?()
第17题:
A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()
第18题:
A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()
第19题:
Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()
第20题:
Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()
第21题:
%systemroot%/debug/netsetup.log
%systemroot%/debug/oakley.log
%systemroot%/tracing/ipnathlp.log
%systemroot%/tracing/ppp.log
第22题:
Configure a directory service access audit policy. Increase the maximum size of the security log.
Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.
Configure an object access audit policy for the directory. Increase the maximum size of the system log.
Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.
第23题:
Configure the system event log to Do not overwrite.
In IAS, in Remote Access Logging, enable the Authentication requests setting.
Configure the Remote Access server to Log all events.
Create a custom remote access policy and configure it for Authentication-Type.
第24题:
Power Users
Administrators
Performance Log Users
Performance Monitor Users