niusouti.com

单选题Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A Events logB System logC User Access logD Admin Access log

题目
单选题
Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()
A

Events log

B

System log

C

User Access log

D

Admin Access log


相似考题
更多“单选题Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A Events logB System logC User Access logD Admin Access log”相关问题
  • 第1题:

    日常故障处理时,在APG40中通过EventViewer,可以看到().

    • A、System log
    • B、Security log
    • C、Audit log
    • D、Application log

    正确答案:A,B,D

  • 第2题:

    Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()

    • A、 Configure a directory service access audit policy. Increase the maximum size of the security log.
    • B、 Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.
    • C、 Configure an object access audit policy for the directory. Increase the maximum size of the system log.
    • D、 Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

    正确答案:D

  • 第3题:

    Weblogic server通过()日志文件来保证事务可靠性。

    • A、TLOG
    • B、Server log
    • C、Domain LOG
    • D、Access LOG

    正确答案:A

  • 第4题:

    A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()

    • A、Application log
    • B、File Replication log
    • C、System log
    • D、Security log

    正确答案:A

  • 第5题:

    What is the FIRST and most important step in system troubleshooting?()

    • A、back up the system data
    • B、gather information about the problem
    • C、try rebooting the system to see if that fixes the problem
    • D、check the System Error Log or Event Log

    正确答案:B

  • 第6题:

    An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem:   Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server  Check for Java errors from EJBs and servlets  Trace WebSphere Commerce Server subsystems and commands  Which of the following files should the administrator check to accomplish these steps?()

    • A、error.log
    • B、trace.log
    • C、http_plugin.log
    • D、servlet.log
    • E、SystemOut.log

    正确答案:B,C,E

  • 第7题:

    A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()

    • A、Perform a policy trace for the specific user and review the output to isolate the problem.
    • B、Review the Events log.
    • C、Review the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.
    • D、Review the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.

    正确答案:A,D

  • 第8题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()

    • A、 Configure the system event log to Do not overwrite.
    • B、 In IAS, in Remote Access Logging, enable the Authentication requests setting.
    • C、 Configure the Remote Access server to Log all events.
    • D、 Create a custom remote access policy and configure it for Authentication-Type.

    正确答案:B

  • 第9题:

    Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You create a domain account named Admin1.  You need to configure the security for Admin1 to meet the following requirements:  (1)Allow Admin1 to monitor events in the system event log and the application event log  (2)Allow Admin1 to create and view counter logs in Performance Monitor  (3)Minimize the user rights assigned to Admin1  To which group should you add Admin1?()

    • A、Power Users
    • B、Administrators
    • C、Performance Log Users
    • D、Performance Monitor Users

    正确答案:C

  • 第10题:

    单选题
    Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()
    A

    Events log

    B

    System log

    C

    User Access log

    D

    Admin Access log


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Your network consists of a single Active Directory domain that contains two domain controllers. Both domain controllers run Windows Server 2003 Service Pack 2 (SP2). Auditing of successful account logon events is enabled on all computers in the domain. You need to identify the last time a specific user logged on to the domain. What should you do? ()
    A

    Examine the System Event Log on the user’s computer.

    B

    Examine the System Event Log on both domain controllers.

    C

    Examine the Security Event Log on both domain controllers.

    D

    Examine the Application Event Log on the user’s computer.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()
    A

    Power Users.

    B

    Administrators.

    C

    Performance Log Users.

    D

    Performance Monitor Users.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    You have a server that runs Windows Server 2003 Service Pack 2 (SP2).  The server has the Routing and Remote Access service enabled and connects to the Internet by using a demand-dial connection. From the Routing and Remote Access snap-in, you open the properties of the server and enable the Log additional Routing and Remote Access information setting. You need to review the log file for issues related to the demand-dial connection.  Which file should you review?()

    • A、%systemroot%/debug/netsetup.log
    • B、%systemroot%/debug/oakley.log
    • C、%systemroot%/tracing/ipnathlp.log
    • D、%systemroot%/tracing/ppp.log

    正确答案:D

  • 第14题:

    过滤王用户上网日志是存放在哪个文件夹下的()

    • A、access_log
    • B、alert_log
    • C、sys_log
    • D、user_log

    正确答案:A

  • 第15题:

    APG的事件查看器(EVENTVIEWER)可以查看下述哪些事件?()

    • A、System Log
    • B、Application Log
    • C、Security Log
    • D、User Log

    正确答案:A,B,C

  • 第16题:

    A technician is troubleshooting a user’s problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?()

    • A、Com+.log
    • B、System Log
    • C、Security Log
    • D、Application Log

    正确答案:B

  • 第17题:

    A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()

    • A、IIS log
    • B、Application log
    • C、System log
    • D、Security log

    正确答案:C

  • 第18题:

    A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()

    • A、Connection Requests
    • B、System Errors
    • C、Enforcer Events
    • D、Enforcer Command Trace

    正确答案:C,D

  • 第19题:

    Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()

    • A、Events log
    • B、System log
    • C、User Access log
    • D、Admin Access log

    正确答案:A

  • 第20题:

    Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()

    • A、Power Users.
    • B、Administrators.
    • C、Performance Log Users.
    • D、Performance Monitor Users.

    正确答案:C

  • 第21题:

    单选题
    You have a server that runs Windows Server 2003 Service Pack 2 (SP2).  The server has the Routing and Remote Access service enabled and connects to the Internet by using a demand-dial connection. From the Routing and Remote Access snap-in, you open the properties of the server and enable the Log additional Routing and Remote Access information setting. You need to review the log file for issues related to the demand-dial connection.  Which file should you review?()
    A

    %systemroot%/debug/netsetup.log

    B

    %systemroot%/debug/oakley.log

    C

    %systemroot%/tracing/ipnathlp.log

    D

    %systemroot%/tracing/ppp.log


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()
    A

     Configure a directory service access audit policy. Increase the maximum size of the security log.

    B

     Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.

    C

     Configure an object access audit policy for the directory. Increase the maximum size of the system log.

    D

     Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()
    A

     Configure the system event log to Do not overwrite.

    B

     In IAS, in Remote Access Logging, enable the Authentication requests setting.

    C

     Configure the Remote Access server to Log all events.

    D

     Create a custom remote access policy and configure it for Authentication-Type.


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You create a domain account named Admin1.  You need to configure the security for Admin1 to meet the following requirements:  (1)Allow Admin1 to monitor events in the system event log and the application event log  (2)Allow Admin1 to create and view counter logs in Performance Monitor  (3)Minimize the user rights assigned to Admin1  To which group should you add Admin1?()
    A

    Power Users

    B

    Administrators

    C

    Performance Log Users

    D

    Performance Monitor Users


    正确答案: C
    解析: 暂无解析