单选题If an invalid username and password is entered on the EchoClient, which log files will be the first to record this (assuming all components have necessary logging and tracing enabled)?()A the PDACLD authentication audit logB the EchoClient log during t

题目
单选题
If an invalid username and password is entered on the EchoClient, which log files will be the first to record this (assuming all components have necessary logging and tracing enabled)?()
A

the PDACLD authentication audit log

B

the EchoClient log during token generation

C

IBM Tivoli Federated Identity Manager (ITFIM) tracing on AppSrv01 during token validation

D

ITFIM tracing on AppSrv03 during an attempted JAAS login

参考答案和解析
正确答案: B
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface.  Which of the following files would show the commands that have been performed from within smit and their resulting output()

  • A、/smit.log
  • B、/smit.script
  • C、/var/log/smit.log
  • D、/.history

正确答案:A

第2题:

Which statement is true regarding the Archiver (ARCn) process,archived log files,and recovery? ()

  • A、A database backup, combined with archived redo log files, guarantees that all committed data can be recovered to the point of failure. 
  • B、During recovery the ARCn background process copies its redo entries identified for recovery by the control file to the data files. 
  • C、After each write to an archived log, the mandatory background process ARCn writes its log sequence number and the first and last SCN number within the log sequence to the control file. 
  • D、At database recover time, and archived redo log is uniquely identified for recovery use by its redo thread number and destination ID number retrieved from the control file.

正确答案:A

第3题:

Whatkeywordsdoyouneedtotheaccess-listtoprovidetotheloggingmessagelikesourceaddressandsourcemacaddress?()

A.Log

B.Log-input

C.Log-output

D.Logging


参考答案:B

第4题:

Publishing was successful but the store won’t launch.  Which log should be checked for errors after tracing has been enabled?()

  • A、trace.log
  • B、message.txt
  • C、activity.log
  • D、trace.txt
  • E、SystemOut.log

正确答案:A,C

第5题:

What keywords do you need to the access-list to provide to the logging message like source address and source mac address?()

  • A、Log
  • B、Log-input
  • C、Log-output
  • D、Logging

正确答案:B

第6题:

The instance abnormally terminates because of a power outage.  Which statement is true about redo log filesduring instance recovery()

  • A、Inactive and current redo log files are required to accomplish recovery.
  • B、Online and archived redo log files are required to accomplish instance recovery.
  • C、All redo log entries after the last checkpoint are applied from redo log files to data files.
  • D、All redo log entries recorded in the current redo log file until the checkpoint position are applied to data files

正确答案:C

第7题:

You have a server that runs Windows Server 2003 Service Pack 2 (SP2).  The server has the Routing and Remote Access service enabled and connects to the Internet by using a demand-dial connection. From the Routing and Remote Access snap-in, you open the properties of the server and enable the Log additional Routing and Remote Access information setting. You need to review the log file for issues related to the demand-dial connection.  Which file should you review?()

  • A、%systemroot%/debug/netsetup.log
  • B、%systemroot%/debug/oakley.log
  • C、%systemroot%/tracing/ipnathlp.log
  • D、%systemroot%/tracing/ppp.log

正确答案:D

第8题:

Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

  • A、to add second factor based authentication to a Web application
  • B、to pre-populate user wallets with all their application credentials in one go
  • C、to enhance out-of-the-box audit logging by creating custom audit log events
  • D、to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On
  • E、to configure automatic password change on expiry for an application so that the new password is a random string of specified strength

正确答案:A,B

第9题:

If an invalid username and password is entered on the EchoClient, which log files will be the first to record this (assuming all components have necessary logging and tracing enabled)?()

  • A、the PDACLD authentication audit log
  • B、the EchoClient log during token generation
  • C、IBM Tivoli Federated Identity Manager (ITFIM) tracing on AppSrv01 during token validation
  • D、ITFIM tracing on AppSrv03 during an attempted JAAS login

正确答案:A

第10题:

Which of the following statements best describes error logging?()

  • A、Syslogd creates error log entries in the system error log. 
  • B、The default error log is stored in /var/adm/ras/error.log. 
  • C、All entries in the error log are related to software problems. 
  • D、Error logging is automatically enabled during system initialization.

正确答案:D

更多相关问题