单选题An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.  Which of the following AIX component accomplishes this()A auditB syslogC TCBD sysck

题目
单选题
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.  Which of the following AIX component accomplishes this()
A

audit

B

syslog

C

TCB

D

sysck

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()

  • A、Request the user to logoff and log back on.
  • B、Add the user as an administrator on their local machine.
  • C、Add the user as an administrator on the server.
  • D、Run an ipconfig /renew on the user’s machine.

正确答案:A

第2题:

An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()

  • A、NIPS
  • B、Honeypot
  • C、DMZ
  • D、NIDS

正确答案:B

第3题:

Anadministratorsuspectssomeoneismodifyingasensitivefile,andwantstologaccessinformationforthisfile.WhichofthefollowingAIXcomponentaccomplishesthis()

A.audit

B.syslog

C.TCB

D.sysck


参考答案:A

第4题:

A system administrator decides to review the system error log after installing new hardware. Which of the following is the correct command to use?()

  • A、errpt
  • B、syslog
  • C、prtdiag
  • D、errlogger

正确答案:A

第5题:

An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()

  • A、/var/adm/sulog
  • B、/etc/syslog.conf
  • C、/etc/security/sysck.cfg
  • D、/etc/security/syslog.conf

正确答案:B

第6题:

A system administrator suspects that there were problems with the AIX installation on a pSeries server. Which of the following commands can be used, with the appropriate flags, to view the BOS installation output files?()

  • A、alog
  • B、errpt
  • C、lscfg
  • D、installp

正确答案:A

第7题:

A system administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this?()

  • A、usrck
  • B、sysck
  • C、lssec
  • D、lsuser

正确答案:A

第8题:

An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.  Which of the following AIX component accomplishes this()

  • A、audit
  • B、syslog
  • C、TCB
  • D、sysck

正确答案:A

第9题:

An  administrator  just  completed  an  AIX  installation  but  suspects  that  not  all  filesets  installed completely. Which of the following commands would verify that all filesets are completely installed()

  • A、installp -E
  • B、Islpp -E
  • C、Ippchk -c
  • D、instfix -c

正确答案:C

第10题:

An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()

  • A、audit
  • B、syslog
  • C、TCB
  • D、sysck

正确答案:A

更多相关问题