网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following logs contains information on overall performance and events not related to user authentication?()
A

Security

B

Audit

C

Application

D

System


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following logs contains information on overall performance and events not related to user authentication?()A SecurityB AuditC ApplicationD System” 相关考题
考题 Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? () A. Events logB. System logC. User Access logD. Admin Access log

考题 A server is having problems booting into the operating system. Which of the following can provide important information to begin to troubleshoot the cause?() A. System logsB. Firmware updatesC. POST messagesD. Application logs

考题 Using the following information: Performance data from an existing system that a new system will replace; Performance estimates that anticipate future workloads; Micro-partitioning and logical partitioning implementations. Which of the following allows a technical sales representative to create a system design which can be imported into an HMC?()A、IBMeConfigB、IBM Performance MonitorC、IBM Workload Estimator (WLE)D、IBM System Planning Tool (SPT)

考题 A server is having problems booting into the operating system. Which of the following can provide important information to begin to troubleshoot the cause?()A、System logsB、Firmware updatesC、POST messagesD、Application logs

考题 To make audit information more productive, the DBA executes the following command before startingan audit operation:  SQL ALTER SYSTEM SET AUDIT_TRAIL=DB,EXTENDED SCOPE=SPFILE;  Which statement is true regarding the audit record generated when auditing starts after restarting thedatabase()A、It contains only the plan for the SQL statement executed by the user.B、It contains the SQL text executed by the user and the bind variables used with it.C、It contains the plan and statistics associated with the SQL statement executed by the user.D、It contains the plan for the SQL statement executed by the user and the bind variables used with it.

考题 Which of the following protocols can be used to retrieve system and network performance information from a router?()A、LDAPB、IMAPC、TFTPD、SNMP

考题 Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()A、AdministratorB、UserC、GuestD、Power user

考题 Which of the following logs contains information on overall performance and events not related to user authentication?()A、SecurityB、AuditC、ApplicationD、System

考题 A server is having problems booting into the operating system.  Which of the following can provide important information to begin to trouble shoot the cause?()A、 System logsB、 Firmware updatesC、 POST messagesD、 Application logs

考题 A System p adminstrator must recover user information from a system that will not successfully boot. Which of the following install methods will accomplish this ()A、PreservationB、MigrationC、New and complete overwriteD、Repair

考题 Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()A、Software problems don't generate errors. B、The user is more knowledgeable about software. C、The system logs will provide useful information alone. D、Key information pertaining to the software may be uncovered.

考题 Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A、Events logB、System logC、User Access logD、Admin Access log

考题 Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()A、Power Users.B、Administrators.C、Performance Log Users.D、Performance Monitor Users.

考题 You have a computer that runs Windows 7. You need to identify which applications were installed during thelast week.  What should you do?()A、From Reliability Monitor, review the informational events.B、From System Information, review the Software Environment.C、From Performance Monitor, review the System Diagnostics Report.D、From Performance Monitor, run the System Performance Data Collector Set.

考题 单选题A System p adminstrator must recover user information from a system that will not successfully boot. Which of the following install methods will accomplish this ()A PreservationB MigrationC New and complete overwriteD Repair

考题 单选题Which of the following protocols can be used to retrieve system and network performance information from a router?()A LDAPB IMAPC TFTPD SNMP

考题 单选题You have a computer that runs Windows 7. You need to identify which applications were installed during thelast week.  What should you do?()A From Reliability Monitor, review the informational events.B From System Information, review the Software Environment.C From Performance Monitor, review the System Diagnostics Report.D From Performance Monitor, run the System Performance Data Collector Set.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The company has a main office in San Francisco and branch offices in Paris and Bogota. Each branch office contains a Windows Server 2003 domain controller. All client computers run Windows XP Professional.   Users in the Bogota office report intermittent problems authenticating to the domain. You suspect that a specific client computer is causing the problem.   You need to capture the authentication event details on the domain controller in the Bogota office so that you can find out the IP address of the client computer that is the source of the problem.   What should you do?  ()A  Configure System Monitor to monitor the authentication events.B  Configure Performance Logs and Alerts with a counter log to record the authentication events.C  Configure Network Monitor to record the authentication events.D  Configure Performance Logs and Alerts with an alert to trigger on authentication events.

考题 单选题Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()A Power Users.B Administrators.C Performance Log Users.D Performance Monitor Users.

考题 单选题Which of the following methods of user authentication is the MOST secure?()A CHAPB KerberosC TACACSD EAP

考题 单选题A server is having problems booting into the operating system. Which of the following can provide important information to begin to troubleshoot the cause?()A System logsB Firmware updatesC POST messagesD Application logs

考题 单选题Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()A Software problems don't generate errors. B The user is more knowledgeable about software. C The system logs will provide useful information alone. D Key information pertaining to the software may be uncovered.

考题 单选题Using the following information: Performance data from an existing system that a new system will replace; Performance estimates that anticipate future workloads; Micro-partitioning and logical partitioning implementations.  Which of the following allows a technical sales representative to create a system design which can be imported into an HMC?()A IBM eConfigB IBM Performance MonitorC IBM Workload Estimator (WLE)D IBM System Planning Tool (SPT)

考题 单选题To make audit information more productive, the DBA executes the following command before starting an auditoperation: SQL ALTER SYSTEM SET AUDIT_TRAIL=DB,EXTENDED SCOPE=SPFILE; Which statement is true regarding the audit record generated when auditing starts after restarting Thedatabase()A It contains only the plan for the SQL statement executed by the user.B It contains the SQL text executed by the user and the bind variables used with it.C It contains the plan and statistics associated with the SQL statement executed by the user.D It contains the plan for the SQL statement executed by the user and the bind variables used with it

考题 单选题To make audit information more productive, the DBA executes the following command before startingan audit operation:  SQL ALTER SYSTEM SET AUDIT_TRAIL=DB,EXTENDED SCOPE=SPFILE;  Which statement is true regarding the audit record generated when auditing starts after restarting thedatabase()A It contains only the plan for the SQL statement executed by the user.B It contains the SQL text executed by the user and the bind variables used with it.C It contains the plan and statistics associated with the SQL statement executed by the user.D It contains the plan for the SQL statement executed by the user and the bind variables used with it.

考题 单选题Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()A AdministratorB UserC GuestD Power user

考题 单选题Which of the following logs contains information on overall performance and events not related to user authentication?()A SecurityB AuditC ApplicationD System

考题 单选题A server is having problems booting into the operating system.  Which of the following can provide important information to begin to trouble shoot the cause?()A  System logsB  Firmware updatesC  POST messagesD  Application logs