网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()
A

Enable the Problem Reporting feature for all users.

B

Configure a custom view to monitor failed logon events on your computer.

C

Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.

D

In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()A Enable the Problem Reporting feature for all users.B Configure a custom view to monitor failed logon events on your computer.C Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.” 相关考题
考题 A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A. service Authentication ManagerB. service AuthorizationC. service CredentialsD. service Security Audit

考题 Your database is in ARCHIVELOG mode. You have two online redo log groups, each of which contains oneredo member. When you attempt to start the database, you receive the following errors:ORA-00313: open failed for members of log group 1 of thread 1ORA-00312: online log 1 thread 1: ‘D:\REDO01.LOG‘You discover that the online redo log file of the current redo group is corrupted.Which statement should you use to resolve this issue?()A. ALTER DATABASE DROP LOGFILE GROUP 1;B. ALTER DATABASE CLEAR LOGFILE GROUP 1;C. ALTER DATABASE CLEAR UNARCHIVED LOGFILE GROUP 1;D. ALTER DATABASE DROP LOGFILE MEMBER ‘D:\REDO01.LOG

考题 Which three statements about dynamic filtering are true? () A. Dynamic filtering creates a query statement.B. Dynamic filtering has an option to save query.C. Dynamic filtering can select any log field to filter.D. Dynamic filtering permanently removes other log entries.E. Dynamic filtering redraws the log when you select a variable link.

考题 You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.What should you do?() A.AB.BC.CD.D

考题 You want to purge job entries older than 5 days from the job log. You do not want to purge window log entries. Which command will you use to accomplish this task?()  A、 EXECUTE DBMS_SCHEDULER.PURGE_LOG(log_history = 5, job_name = ’JOB1’);B、 EXECUTE DBMS_SCHEDULER.PURGE_LOG( log_history = 5, job_name = ’JOB_LOG’);C、 EXECUTE DBMS_SCHEDULER.PURGE_LOG( log_history = 5, which_log = ’JOB1’);D、 EXECUTE DBMS_SCHEDULER.PURGE_LOG( log_history = 5, which_log =’JOB_LOG’);

考题 Where do you find information about a missing redo log file?()A、trace fileB、audit trailC、control fileD、alert log fileE、event viewer

考题 Consider the MySQL Enterprise Audit plugin, You add the following lines to the my.cnf configuration tile: [mysqld] Plugin-load=audit_log.so Audit-log=FORCE_PLUS_PERMANENT You attempt to start up the MySQL service and notice that it fails to start. Which two statements would explain why the service did not start?()A、FORCE_PLUS_PERMANENT is not valid for the audit-log optionB、The audit_log.so library does not existC、The audit_log.so library is in a location that is different from that defined by the plugin_dir optionD、The audit plugin must be loaded dynamically by using the INSTALL PLUGIN commandE、The audit log file does not exist in which to write audit eventsF、The audit_log.so library is not an executable file

考题 Which of the following statements best describes error logging?()A、Syslogd creates error log entries in the system error log. B、The default error log is stored in /var/adm/ras/error.log. C、All entries in the error log are related to software problems. D、Error logging is automatically enabled during system initialization.

考题 You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()A、Enable the Problem Reporting feature for all users.B、Configure a custom view to monitor failed logon events on your computer.C、Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D、In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.

考题 You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged.  What should you do?()A、Start the Problem Steps Recorder.B、From Event Viewer, modify the properties of the Security log.C、From the local Group Policy, configure the Audit object access setting.D、From the local Group Policy, configure the Audit directory service Access setting.

考题 A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A、service Authentication ManagerB、service AuthorizationC、service CredentialsD、service Security Audit

考题 You are a network administrator for ExamSheet.net's Windows 2000 network.  You use a user account named User1 to log on tot a Windows 2000 Professional computer. The computer is used by different students in a classroom. User1 does not have administrative rights. However, you prefer to use this account for your daily activities. Using the Task Scheduler you schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. You configure the task to run as the administrator account.  After the task was scheduled to have run you open the Task Scheduler and discover a status of "Could not start" for the task. You also discover account logon failure audit events in the computer's Security log.You want the scheduled task to successfully run AddUsers.cmd. You want to accomplish this with the least amount of administrative effort.  What should you do?()A、Schedule the task using theATcommand.B、Reenter the password for the administrator account using the Task Scheduler.C、Log on with an administrative account and reschedule the task.D、Log on by using the local Administrator account. Then schedule the task to run under User1.

考题 Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()A、In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.B、In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.C、In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.D、In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.

考题 单选题You are a database administrator for your company. The company uses a SQL Server 2005 computer that runs Reporting Services. Reporting Services is used to produce hundreds of reports each day. You discover that the ReportServerTempDB database is growing. You need to minimize the size of the ReportServerTempDB database. What should you do?()A Decrease the time between transaction log backups of the database.B Delete report snapshot history each week.C Minimize the use of session caching in the reports.D Minimize the use of report snapshots in the reports.

考题 单选题You want to purge job entries older than 5 days from the job log. You do not want to purge window log entries. Which command will you use to accomplish this task?()A  EXECUTE DBMS_SCHEDULER.PURGE_LOG(log_history = 5, job_name = ’JOB1’);B  EXECUTE DBMS_SCHEDULER.PURGE_LOG( log_history = 5, job_name = ’JOB_LOG’);C  EXECUTE DBMS_SCHEDULER.PURGE_LOG( log_history = 5, which_log = ’JOB1’);D  EXECUTE DBMS_SCHEDULER.PURGE_LOG( log_history = 5, which_log =’JOB_LOG’);

考题 单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()A Enable the Require domain controller to unlock policy.B Set the Number of previous logons to cache policy to 0.  C Remove all user and group accounts from the Log on locally user right. D Remove all user and group accounts from the Access this computer from the network user right. 

考题 单选题Which of the following statements best describes error logging?()A Syslogd creates error log entries in the system error log. B The default error log is stored in /var/adm/ras/error.log. C All entries in the error log are related to software problems. D Error logging is automatically enabled during system initialization.

考题 单选题When the AIM-CUE is being used, where do log messages go if the log file is full?()A The initial log file is named message.log.prev, and a new file named message.log is started. B Once the log file is full, the oldest log entries are dropped to make space for new entries. C When the log file becomes full, it is automatically copied to an external server and a new message.log file is started. D Once the log file becomes full, it stops logging new messages and the new log messages are lost.

考题 单选题Your database is in ARCHIVELOG mode. You have two online redo log groups, each of which contains one redo member. When you attempt to start the database, you receive the following errors: ORA-00313: open failed for members of log group 1 of thread 1 ORA-00312: online log 1 thread 1: 'D:/REDO01.LOG' You discover that the online redo log file of the current redo group is corrupted. Which statement should you use to resolve this issue?()A ALTER DATABASE DROP LOGFILE GROUP 1;B ALTER DATABASE CLEAR LOGFILE GROUP 1;C ALTER DATABASE CLEAR UNARCHIVED LOGFILE GROUP 1;D ALTER DATABASE DROP LOGFILE MEMBER 'D:/REDO01.LOG

考题 多选题You work as a database administrator for Supportcenter.cn. Users in the SupportCenter PROD database complain about the slow response when accessing the database. In the Active Session Waiting: Configuration page you find that the majority of the wait time is for the redo log buffer. Further investigation using the Run Queue graph and operating system tools reveals that the redo log files are on the same disks, and that the disk I/O for the redo log files is the reason for the performance degradation.  Which two actions would you take to gain performance?()AIncrease the size of redo log filesBIncrease the size of redo log bufferCIncrease the number of redo log filesDPlace the redo log files on a separate diskEDecrease the number of redo log groups to twoFIncreate the number Log Writer (LGWR) process

考题 单选题You use a Windows 2000 Professional computer to run a weekly accounts table. The report has the name ap_financial_reports. You also want the use the computer to run a task named perf_log to connect to network routers and retrieve their performance logs. When the ap_financial_report is running on the computer perf_log task stops responding the eventually times out. When you run only the perf_log task the task completes successfully. You use the task manager to view your system resources. You want to resolve the performance log time out problem by using task manager. What should you do?()A Decrease the base priority of the ap_financial_reports task.B Decrease the number of threads available for the ap_financial_reports task.C Increase the base priority of the perf_log task.D Increase the number of threats available for perf_log task.

考题 单选题The instance abnormally terminates because of a power outage.  Which statement is true about redo log filesduring instance recovery()A Inactive and current redo log files are required to accomplish recovery.B Online and archived redo log files are required to accomplish instance recovery.C All redo log entries after the last checkpoint are applied from redo log files to data files.D All redo log entries recorded in the current redo log file until the checkpoint position are applied to data files

考题 多选题Consider the MySQL Enterprise Audit plugin, You add the following lines to the my.cnf configuration tile: [mysqld] Plugin-load=audit_log.so Audit-log=FORCE_PLUS_PERMANENT You attempt to start up the MySQL service and notice that it fails to start. Which two statements would explain why the service did not start?()AFORCE_PLUS_PERMANENT is not valid for the audit-log optionBThe audit_log.so library does not existCThe audit_log.so library is in a location that is different from that defined by the plugin_dir optionDThe audit plugin must be loaded dynamically by using the INSTALL PLUGIN commandEThe audit log file does not exist in which to write audit eventsFThe audit_log.so library is not an executable file

考题 单选题Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A  Configure a directory service access audit policy. Increase the maximum size of the security log.B  Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C  Configure an object access audit policy for the directory. Increase the maximum size of the system log.D  Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

考题 单选题The instance abnormally terminates because of a power outage. Which statement is true about redolog files during instance recovery()A Inactive and current redo log files are required to accomplish recovery.B Online and archived redo log files are required to accomplish instance recovery.C All redo log entries after the last checkpoint are applied from redo log files to data files.D All redo log entries recorded in the current redo log file until the checkpoint position are applied to datafiles.

考题 多选题Which three statements about dynamic filtering are true? ()ADynamic filtering creates a query statement.BDynamic filtering has an option to save query.CDynamic filtering can select any log field to filter.DDynamic filtering permanently removes other log entries.EDynamic filtering redraws the log when you select a variable link.

考题 单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You enable auditing for failed logon attempts on all domain controllers. You need to ensure that a record of failed logon attempts is retained for 90 days on all domain controllers. What should you do?()A From the Security Templates snap-in, open the hisecdc template. Modify the Retain System Log setting.B From the Security Templates snap-in, open the securedc template. Modify the Retain Security Log setting.C Open the Default Domain Policy. Modify the Retain System Log setting.D Open the Default Domain Controller Policy. Modify the Retain Security Log setting.

考题 单选题Consider the MySQL Enterprise Audit plugin. On attempting to start the MySQL service after a crash, notice the following error: [ERROR] Plugin ‘audit_log’ init function returned error. In the audit log file, you notice the final entry: … What action should you take to fix the error and allow the service to start?()A Re-install the audit pluginB Execute the command FLUSH LOGSC Execute the command SET GLOBAL audit_log_fiush= OND Move or rename the existing audit.log file