网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An administrator performs an audit on the /usr filesystem and finds the following permissions: -rwsr-xr-x 1 root sys 514288 Jun 18 09:40 /usr/local/bin/nmon Which of the following methods can the administrator use to remove a potential security risk()
A
rm /usr/local/bin/nmon
B
chmod u-s /usr/local/bin/nmon
C
Reinstall the file from the appropriate fileset
D
chmod go-rx /usr/local/bin/nmon
参考答案
参考解析
解析:
暂无解析
更多 “单选题An administrator performs an audit on the /usr filesystem and finds the following permissions: -rwsr-xr-x 1 root sys 514288 Jun 18 09:40 /usr/local/bin/nmon Which of the following methods can the administrator use to remove a potential security risk()A rm /usr/local/bin/nmonB chmod u-s /usr/local/bin/nmonC Reinstall the file from the appropriate filesetD chmod go-rx /usr/local/bin/nmon” 相关考题
考题
If a kill -9 is performed on the clstrmgrES process, the default action is to halt the system. Tochange the default action to do something other then halting the system, which of the following files must be modified?() A、 /usr/es/sbin/cluster/etc/clexit.rcB、 /usr/es/sbin/cluster/etc/hacmp.termC、 /usr/es/sbin/cluster/etc/rc.clusterD、 /usr/es/sbin/cluster/etc/rc.shutdown
考题
You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
考题
A system administrator wants to run a script called myscript, but does not want to see the errors that might be generated by the script. How would this be accomplished?()A、/usr/local/bin/myscript /dev/nullB、/usr/local/bin/myscript /dev/nullC、/usr/local/bin/myscript 2 /dev/nullD、/usr/local/bin/myscript 1 /dev/null
考题
A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.
考题
Which of the following contain the BOS ODM files()A、/usr/objreposB、/usr/lpp/objreposC、/usr/bin/objreposD、/etc/objrepos
考题
An administrator requires a summary of current configuration for each system. This is needed for an audit trail. Which of the following will provide this information()A、configassistB、prtconfC、IsattrD、listdgrp
考题
While using the smit install_remove menus to remove some filesets the system administrator notices the /usr filesystem is now unnecessarily large. Which of the following actions will reduce the size of the /usr filesystem?()A、Backup, unmount, remove, recreate and restore the filesystem.B、Boot from mksysb tape and select Shrink filesystems on restore.C、Unmount, run defragfs /usr and the reducefs -size XXX /usr commands.D、Update /etc/filesystems with the desired size for /usr and reboot the system.
考题
A system administrator issued the errpt command and had no results. The system administrator determined that error logging was turned off. Which of the following commands should be used to start logging system errors?()A、/usr/bin/errmsgB、/usr/lib/errdemonC、/usr/lib/errloggerD、/usr/bin/errinstall
考题
A system administrator has just finished upgrading a system to AIX 5.2. If there are future problems, the system administrator would like to add an entry to the AIX errorlog to record this event. Which of the following commands can be issued for this purpose?()A、/usr/bin/errmsg "System upgraded to AIX 5.2"B、/usr/bin/errlog "System upgraded to AIX 5.2"C、/usr/bin/errupdate "System upgraded to AIX 5.2"D、/usr/bin/errlogger "System upgraded to AIX 5.2"
考题
An AIX system administrator wants to be able to monitor disk usage and to be able to control how much disk space can be used. Which command is run to obtain the desired output?()A、 /usr/bin/filemon B、 /usr/bin/startsrc C、 /usr/sbin/acct/startup D、 /usr/bin/df
考题
You need to change the hostname and IP address of a server. Without manually editing all of the required files, which command can be run to restore a system configuration to an unconfigured state, ready to be reconfigured again restore a system configuration to an unconfigured state, ready to be reconfigured again? ()A、 /usr/sbin/sys-unconfigB、 /usr/sbin/unconfigC、 /sbin/ipconfigD、 /usr/sbin/set_parms initial
考题
Your company has file servers located in an organizational unit named Payroll. The file servers contain payroll files located in a folder named Payroll. You create a GPO. You need to track which employees access the Payroll files on the file servers. What should you do() A、Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file servers, configureB、Enable the Audit object access option. Link the GPO to the domain. On the domain controllers, configure Auditing fC、Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit. On the file seD、Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file servers, config
考题
Certkiller .com has organizational units in the Active Directory domain. There are 10 servers in the organizational unit called Security. As an administrator at Certkiller .com, you generate a Group Policy Object (GPO) and link it to the Security organizational unit. What should you do to monitor the network connections to the servers in Security organizational unit()A、Start the Audit Object Access optionB、Start the Audit System Events optionC、Start the Audit Logon Events optionD、Start the Audit process tracking optionE、All of the above
考题
单选题A system administrator issued the errpt command and had no results. The system administrator determined that error logging was turned off. Which of the following commands should be used to start logging system errors?()A
/usr/bin/errmsgB
/usr/lib/errdemonC
/usr/lib/errloggerD
/usr/bin/errinstall
考题
单选题An administrator needs to add the /usr/vac/bin directory to their PATH environment variable for the current session. Which of the following will accomplish this task()A
path=$path:/usr/vac/bin; export pathB
path.=/usr/vac/bin; export $pathC
Modify the path environment variable in /etc/profileD
Modify the path environment variable in /.profile
考题
单选题You need to change the hostname and IP address of a server. Without manually editing all of the required files, which command can be run to restore a system configuration to an unconfigured state, ready to be reconfigured again restore a system configuration to an unconfigured state, ready to be reconfigured again? ()A
/usr/sbin/sys-unconfigB
/usr/sbin/unconfigC
/sbin/ipconfigD
/usr/sbin/set_parms initial
考题
多选题You work as a database administrator for Certkiller .com. In your development environmentenvironment, the developers are responsible for modifying the table structure according to the application requirements. However, you want to keep track of the ALTER TABLE commands being executed by developers, so you enable auditing to achieve this objective. Which two views would you refer to find out the audit information?()ADBA_AUDIT_TRAILBDBA_AUDIT_SESSIONCDBA_FGA_AUDIT_TRAILDDBA_COMMON_AUDIT_TRAIL
考题
单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()A
Enable audit object access and specify files and folders to monitor using Task Manager.B
Enable audit policy change and specify files and folders to monitor using Windows Explorer.C
Enable audit object access and specify files and folders to monitor using Windows Explorer.D
Open Performance Monitor and monitor folder activity.
考题
单选题You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()A
Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B
Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.C
Use Windows Explorer to turn on auditing for the specific files. D
Have the administrator for domains log you on as an administrator and enable auditing for a specific file.E
Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F
Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
考题
单选题If a kill -9 is performed on the clstrmgrES process, the default action is to halt the system. Tochange the default action to do something other then halting the system, which of the following files must be modified?()A
/usr/es/sbin/cluster/etc/clexit.rcB
/usr/es/sbin/cluster/etc/hacmp.termC
/usr/es/sbin/cluster/etc/rc.clusterD
/usr/es/sbin/cluster/etc/rc.shutdown
考题
单选题Where do the BOS ODM files reside?()A
/etc/odmB
/usr/lpp/odmC
/var/bosinfoD
/etc/objrepos
考题
单选题Which of the following contain the BOS ODM files()A
/usr/objreposB
/usr/lpp/objreposC
/usr/bin/objreposD
/etc/objrepos
考题
单选题A system administrator has just finished upgrading a system to AIX 5.2. If there are future problems, the system administrator would like to add an entry to the AIX errorlog to record this event. Which of the following commands can be issued for this purpose?()A
/usr/bin/errmsg System upgraded to AIX 5.2B
/usr/bin/errlog System upgraded to AIX 5.2C
/usr/bin/errupdate System upgraded to AIX 5.2D
/usr/bin/errlogger System upgraded to AIX 5.2
考题
单选题An AIX system administrator wants to be able to monitor disk usage and to be able to control how much disk space can be used. Which command is run to obtain the desired output?()A
/usr/bin/filemon B
/usr/bin/startsrc C
/usr/sbin/acct/startup D
/usr/bin/df
考题
单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Confidential files are stored on a member server named TK1. The computer object for TK1 resides in an organizational unit (OU) named Confidential. A Group Policy object (GPO) named GPO1 is linked to the Confidential OU. To audit access to the confidential files, you enable auditing on all private folders on TK1. Several days later, you review the audit logs. You discover that auditing is not successful. You need to ensure that auditing occurs successfully. What should you do?()A
Start the System Event Notification Service (SENS) on TK1.B
Start the Error Reporting service on TK1.C
Modify the Default Domain Controllers GPO by selecting Success and Failure as the Audit Object Access setting.D
Modify GPO1 by selecting Success and Failure as the Audit Object Access setting.
考题
单选题A system administrator wants to run a script called myscript, but does not want to see the errors that might be generated by the script. How would this be accomplished?()A
/usr/local/bin/myscript /dev/nullB
/usr/local/bin/myscript /dev/nullC
/usr/local/bin/myscript 2 /dev/nullD
/usr/local/bin/myscript 1 /dev/null
热门标签
最新试卷