audit
syslog
TCB
sysck
第1题:
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()
第2题:
An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()
第3题:
A system administrator decides to review the system error log after installing new hardware. Which of the following is the correct command to use?()
第4题:
How would an AIX administrator find information regarding smit menu definitions ()
第5题:
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()
第6题:
Examine the values for the following initialization parameters: FAST_START_MTTR_TARGET = 0LOG_CHECKPOINT_INTERVAL = 0 Which two will be the implications of these values in your database()
第7题:
audit
syslog
TCB
sysck
第8题:
/var/adm/sulog
/etc/syslog.conf
/etc/security/sysck.cfg
/etc/security/login.cfg
第9题:
alog
errpt
lscfg
installp
第10题:
usrck
sysck
lssec
lsuser
第11题:
/var/adm/sulog
/etc/syslog.conf
/etc/security/sysck.cfg
/etc/security/syslog.conf
第12题:
ALTER DATABASE
ALTER SYSTEM
ALTER USER
ALTER REDO LOG
第13题:
A system administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this?()
第14题:
An administrator just completed an AIX installation but suspects that not all filesets installed completely. Which of the following commands would verify that all filesets are completely installed()
第15题:
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()
第16题:
A System p administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this()
第17题:
You are attempting to clear an unarchived redo log file. In order to manually enact a log switch, which of the following statements is appropriate?()
第18题:
You develop a Web application that writes data to a file on a server. You restrict access to the file to specific Windows users. The Web application runs as CONTOSO/ASPNET. You deny anonymous access to the application in IIS. You add the following XML segment in the Web.config file.You need to ensure that the application meets the following requirements:It must impersonate the user when it writes data to the file.It must run as CONTOSO/ASPNET when a user does not access the file. Which two actions should you perform? ()
第19题:
sysck
usrck
lssec
lsuser
第20题:
Request the user to logoff and log back on.
Add the user as an administrator on their local machine.
Add the user as an administrator on the server.
Run an ipconfig /renew on the user’s machine.
第21题:
audit
syslog
TCB
sysck
第22题:
NIPS
Honeypot
DMZ
NIDS
第23题:
Use ODM commands
In the /smit.log file
In the /etc/environment file
In the/usr/lib/smit/menu.cfg file
第24题:
installp -E
Islpp -E
Ippchk -c
instfix -c