Which of the following logs cont

题目

Which of the following logs contains information on overall performance and events not related to user authentication?()

  • A、Security
  • B、Audit
  • C、Application
  • D、System
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A technician installed a new application on a Windows XP desktop. When the technician tries to launch the application it crashes. Which of the following can the technician use to troubleshoot the application?()

  • A、System logs
  • B、Security logs
  • C、Application logs
  • D、Application installation logs

正确答案:C

第2题:

An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()

  • A、The supporting documentation
  • B、The vendor website
  • C、The Internet
  • D、The server event logs

正确答案:D

第3题:

Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()

A. The document is set to hidden.

B. The document is locked.

C. The document was saved as a system document.

D. The document is owned by the first user.


参考答案:D

第4题:

Which of the following can limit cabling mistakes?()

  • A、Proper labeling
  • B、Asset management
  • C、Keeping good vendor logs
  • D、Keeping up-to-date repair logs

正确答案:A

第5题:

An administrator is troubleshooting issues on an application server.After a root cause analysis,the administrator has determined that there were some unauthorized logins to the server.Which of the following locations would BEST help to determine details about the unauthorized logins?()

  • A、Active Directory
  • B、DHCP logs
  • C、Security logs
  • D、System logs

正确答案:C

第6题:

Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()

  • A、The document is set to hidden.
  • B、The document is locked.
  • C、The document was saved as a system document.
  • D、The document is owned by the first user.

正确答案:D

第7题:

A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()

  • A、NIC filtering is enabled.
  • B、Port security is configured.
  • C、NIC is not in promiscuous mode.
  • D、NIC is in promiscuous mode.

正确答案:C

第8题:

While reviewing the backup logs a server administrator notices that a backup job for an application server on the same subnet has failed. Which of the following is MOST likely the problem?()

  • A、The remote agent was not running.
  • B、The management card has failed.
  • C、The proxy server was blocking access.
  • D、The hardware firewall was blocking access.

正确答案:A

第9题:

A server is having problems booting into the operating system.  Which of the following can provide important information to begin to trouble shoot the cause?()

  • A、 System logs
  • B、 Firmware updates
  • C、 POST messages
  • D、 Application logs

正确答案:C

第10题:

Which of the following commands can be used to review the system error logs?()

  • A、 errpt -a
  • B、 errpt -l
  • C、 errdemon -l
  • D、 syslogd -r

正确答案:A

更多相关问题