网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()

  • A、audit
  • B、syslog
  • C、TCB
  • D、sysck

参考答案

更多 “ An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()A、auditB、syslogC、TCBD、sysck” 相关考题
考题 Anadministratorsuspectssomeoneismodifyingasensitivefile,andwantstologaccessinformationforthisfile.WhichofthefollowingAIXcomponentaccomplishesthis() A.auditB.syslogC.TCBD.sysck

考题 An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.  Which of the following AIX component accomplishes this()A、auditB、syslogC、TCBD、sysck

考题 A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()A、Request the user to logoff and log back on.B、Add the user as an administrator on their local machine.C、Add the user as an administrator on the server.D、Run an ipconfig /renew on the user’s machine.

考题 When planning to access the on-line documentation from a remote client, which of the following procedures should be performed on the server?()A、Install and configure the HTTPServer. B、Add the name(s) of the client(s) to the httplite.conf file. C、Add the names of any clients expecting to access the documentation to the /etc/hosts file. D、No action is required.

考题 You develop a Web application that writes data to a file on a server. You restrict access to the file to specific Windows users. The Web application runs as CONTOSO/ASPNET. You deny anonymous access to the application in IIS. You add the following XML segment in the Web.config file. You need to ensure that the application meets the following requirements: 1. It must impersonate the user when it writes data to the file 2. It must run as CONTOSO/ASPNET when a user does not access the file. Which two actions should you perform?()A、Use the following XML segment in the Web.config file.identity impersonate="false"/B、 Use the following XML segment in the Web.config file.identity impersonate="true"/C、Use the following code segment to access the file. WindowsPrincipal wp =(WindowsPrincipal)HttpContext,Current.User;WindowsIdentity wt = (WindowsIdentity)wp.Idetity;WindowsImpersonationContext wic = wi.Impersonate();// Access The file herewic.Undo();D、Use the following code segment to access the file. WindowsIdentity wi = WindowsIdetity.GetCurrent();WindowsImpersonationContext wic = WindowsIdentity.Impersonate(wi.Token);// Access the file herewic.Undo();

考题 A system administrator suspects that there were problems with the AIX installation on a pSeries server. Which of the following commands can be used, with the appropriate flags, to view the BOS installation output files?()A、alogB、errptC、lscfgD、installp

考题 An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS

考题 A system administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this?()A、usrckB、sysckC、lssecD、lsuser

考题 An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/syslog.conf

考题 An  administrator  just  completed  an  AIX  installation  but  suspects  that  not  all  filesets  installed completely. Which of the following commands would verify that all filesets are completely installed()A、installp -EB、Islpp -EC、Ippchk -cD、instfix -c

考题 A system administrator decides to review the system error log after installing new hardware. Which of the following is the correct command to use?()A、errptB、syslogC、prtdiagD、errlogger

考题 How would an AIX administrator find information regarding smit menu definitions ()A、Use ODM commandsB、In the /smit.log fileC、In the /etc/environment fileD、In the/usr/lib/smit/menu.cfg file

考题 A System p administrator would like to verify the user definitions in the /etc/passwd file.  Which of the following commands will accomplish this()A、sysckB、usrckC、lssecD、lsuser

考题 A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/login.cfg

考题 Which directory does the Junos OS use to store syslog information by default?()A、A/ar/messagesB、A/ar/syslogC、/var/tmpD、/var/log

考题 You are attempting to clear an unarchived redo log file. In order to manually enact a log switch, which of the following statements is appropriate?()A、ALTER DATABASE B、ALTER SYSTEM C、ALTER USER D、ALTER REDO LOG

考题 Examine the values for the following initialization parameters: FAST_START_MTTR_TARGET = 0LOG_CHECKPOINT_INTERVAL = 0 Which two will be the implications of these values in your database()A、The SGA advisor will be disabled.B、The MTTR advisor will be disabled.C、Automatic checkpoint tuning will be disabled.D、Checkpoint information will not be written to the alert log file.

考题 You received the following error:   ORA-01578: ORACLE data block corrupted   (file # %s, block # %s)   Which file will you check to view additional information regarding the cause of this error?()A、the alert log file and the trace filesB、 the redo log filesC、 the control fileD、 the change tracking file

考题 You develop a Web application that writes data to a file on a server. You restrict access to the file to specific Windows users. The Web application runs as CONTOSO/ASPNET. You deny anonymous access to the application in IIS. You add the following XML segment in the Web.config file.You need to ensure that the application meets the following requirements:It must impersonate the user when it writes data to the file.It must run as CONTOSO/ASPNET when a user does not access the file. Which two actions should you perform? ()A、Use the following XML segment in the Web.config file. identity impersonate="false"/B、Use the following XML segment in the Web.config file. identity impersonate="true"/C、Use the following code segment to access the file. Dim wp As WindowsPrincipal = _CType(HttpContext.Current.User, WindowsPrincipal) Dim wi As WindowsIdentity = WindowsIdentity.GetCurrent() Dim wic As WindowsImpersonationContext = wi.Impersonate()' Access the file herewic.Undo()D、Use the following code segment to access the file. Dim wi As WindowsIdentity = WindowsIdentity.GetCurrent()Dim wic As WindowsImpersonationContext = _WindowsIdentity.Impersonate(wi.Token)' Access the file herewic.Undo()

考题 You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'. B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file. E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'. F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

考题 单选题An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.  Which of the following AIX component accomplishes this()A auditB syslogC TCBD sysck

考题 单选题A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A /var/adm/sulogB /etc/syslog.confC /etc/security/sysck.cfgD /etc/security/login.cfg

考题 单选题An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()A auditB syslogC TCBD sysck

考题 单选题An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()A /var/adm/sulogB /etc/syslog.confC /etc/security/sysck.cfgD /etc/security/syslog.conf

考题 单选题How would an AIX administrator find information regarding smit menu definitions ()A Use ODM commandsB In the /smit.log fileC In the /etc/environment fileD In the/usr/lib/smit/menu.cfg file

考题 多选题Examine the values for the following initialization parameters: FAST_START_MTTR_TARGET = 0LOG_CHECKPOINT_INTERVAL = 0 Which two will be the implications of these values in your database()AThe SGA advisor will be disabled.BThe MTTR advisor will be disabled.CAutomatic checkpoint tuning will be disabled.DCheckpoint information will not be written to the alert log file.

考题 单选题You received the following error:   ORA-01578: ORACLE data block corrupted   (file # %s, block # %s)   Which file will you check to view additional information regarding the cause of this error?()A the alert log file and the trace filesB  the redo log filesC  the control fileD  the change tracking file