niusouti.com

单选题An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.  Which of the following AIX component accomplishes this()A auditB syslogC TCBD sysck

题目
单选题
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.  Which of the following AIX component accomplishes this()
A

audit

B

syslog

C

TCB

D

sysck


相似考题
更多“单选题An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.  Which of the following AIX component accomplishes this()A auditB syslogC TCBD sysck”相关问题
  • 第1题:

    An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()

    • A、NIPS
    • B、Honeypot
    • C、DMZ
    • D、NIDS

    正确答案:B

  • 第2题:

    An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()

    • A、/var/adm/sulog
    • B、/etc/syslog.conf
    • C、/etc/security/sysck.cfg
    • D、/etc/security/syslog.conf

    正确答案:B

  • 第3题:

    A system administrator decides to review the system error log after installing new hardware. Which of the following is the correct command to use?()

    • A、errpt
    • B、syslog
    • C、prtdiag
    • D、errlogger

    正确答案:A

  • 第4题:

    How would an AIX administrator find information regarding smit menu definitions ()

    • A、Use ODM commands
    • B、In the /smit.log file
    • C、In the /etc/environment file
    • D、In the/usr/lib/smit/menu.cfg file

    正确答案:A

  • 第5题:

    A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()

    • A、/var/adm/sulog
    • B、/etc/syslog.conf
    • C、/etc/security/sysck.cfg
    • D、/etc/security/login.cfg

    正确答案:B

  • 第6题:

    Examine the values for the following initialization parameters: FAST_START_MTTR_TARGET = 0LOG_CHECKPOINT_INTERVAL = 0 Which two will be the implications of these values in your database()

    • A、The SGA advisor will be disabled.
    • B、The MTTR advisor will be disabled.
    • C、Automatic checkpoint tuning will be disabled.
    • D、Checkpoint information will not be written to the alert log file.

    正确答案:B,C

  • 第7题:

    单选题
    An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.  Which of the following AIX component accomplishes this()
    A

    audit

    B

    syslog

    C

    TCB

    D

    sysck


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()
    A

    /var/adm/sulog

    B

    /etc/syslog.conf

    C

    /etc/security/sysck.cfg

    D

    /etc/security/login.cfg


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    A system administrator suspects that there were problems with the AIX installation on a pSeries server. Which of the following commands can be used, with the appropriate flags, to view the BOS installation output files?()
    A

    alog

    B

    errpt

    C

    lscfg

    D

    installp


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    A system administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this?()
    A

    usrck

    B

    sysck

    C

    lssec

    D

    lsuser


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()
    A

    /var/adm/sulog

    B

    /etc/syslog.conf

    C

    /etc/security/sysck.cfg

    D

    /etc/security/syslog.conf


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    You are attempting to clear an unarchived redo log file. In order to manually enact a log switch, which of the following statements is appropriate?()
    A

    ALTER DATABASE 

    B

    ALTER SYSTEM 

    C

    ALTER USER 

    D

    ALTER REDO LOG


    正确答案: A
    解析: 暂无解析

  • 第13题:

    A system administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this?()

    • A、usrck
    • B、sysck
    • C、lssec
    • D、lsuser

    正确答案:A

  • 第14题:

    An  administrator  just  completed  an  AIX  installation  but  suspects  that  not  all  filesets  installed completely. Which of the following commands would verify that all filesets are completely installed()

    • A、installp -E
    • B、Islpp -E
    • C、Ippchk -c
    • D、instfix -c

    正确答案:C

  • 第15题:

    An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()

    • A、audit
    • B、syslog
    • C、TCB
    • D、sysck

    正确答案:A

  • 第16题:

    A System p administrator would like to verify the user definitions in the /etc/passwd file.  Which of the following commands will accomplish this()

    • A、sysck
    • B、usrck
    • C、lssec
    • D、lsuser

    正确答案:B

  • 第17题:

    You are attempting to clear an unarchived redo log file. In order to manually enact a log switch, which of the following statements is appropriate?()

    • A、ALTER DATABASE 
    • B、ALTER SYSTEM 
    • C、ALTER USER 
    • D、ALTER REDO LOG

    正确答案:B

  • 第18题:

    You develop a Web application that writes data to a file on a server. You restrict access to the file to specific Windows users. The Web application runs as CONTOSO/ASPNET. You deny anonymous access to the application in IIS. You add the following XML segment in the Web.config file.You need to ensure that the application meets the following requirements:It must impersonate the user when it writes data to the file.It must run as CONTOSO/ASPNET when a user does not access the file. Which two actions should you perform? ()

    • A、Use the following XML segment in the Web.config file. <identity impersonate="false"/>
    • B、Use the following XML segment in the Web.config file. <identity impersonate="true"/>
    • C、Use the following code segment to access the file. Dim wp As WindowsPrincipal = _CType(HttpContext.Current.User, WindowsPrincipal) Dim wi As WindowsIdentity = WindowsIdentity.GetCurrent() Dim wic As WindowsImpersonationContext = wi.Impersonate()' Access the file herewic.Undo()
    • D、Use the following code segment to access the file. Dim wi As WindowsIdentity = WindowsIdentity.GetCurrent()Dim wic As WindowsImpersonationContext = _WindowsIdentity.Impersonate(wi.Token)' Access the file herewic.Undo()

    正确答案:A,C

  • 第19题:

    单选题
    A System p administrator would like to verify the user definitions in the /etc/passwd file.  Which of the following commands will accomplish this()
    A

    sysck

    B

    usrck

    C

    lssec

    D

    lsuser


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()
    A

    Request the user to logoff and log back on.

    B

    Add the user as an administrator on their local machine.

    C

    Add the user as an administrator on the server.

    D

    Run an ipconfig /renew on the user’s machine.


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()
    A

    audit

    B

    syslog

    C

    TCB

    D

    sysck


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()
    A

    NIPS

    B

    Honeypot

    C

    DMZ

    D

    NIDS


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    How would an AIX administrator find information regarding smit menu definitions ()
    A

    Use ODM commands

    B

    In the /smit.log file

    C

    In the /etc/environment file

    D

    In the/usr/lib/smit/menu.cfg file


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    An  administrator  just  completed  an  AIX  installation  but  suspects  that  not  all  filesets  installed completely. Which of the following commands would verify that all filesets are completely installed()
    A

    installp -E

    B

    Islpp -E

    C

    Ippchk -c

    D

    instfix -c


    正确答案: A
    解析: 暂无解析