Application log
File Replication log
System log
Security log
第1题:
A. Perform an antivirus program scan
B. Boot the machine into Safe Mode
C. Remove the machine from the network
D. Check for system security patches
第2题:
A.System log
B.Security log
C.Audit log
D.Application log
第3题:
A. Events log
B. System log
C. User Access log
D. Admin Access log
第4题:
In which file can the administrator view the detailed results of the overnight cluster automatic verification?()
第5题:
A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()
第6题:
A.CiscoMIVR.log
B.CiscoMADM.log
C.CiscoMEDT.log
D.CiscoMCVD.log
第7题:
下面那个log文件是属于PONNBI北向系统的
第8题:
A. NTBACKUP log
B. Advanced tab in the System applet in Control Panel
C. Event Log
D. Internet Options applet in Control Panel
第9题:
A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()
第10题:
A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()