fwtmp < /etc/security/failedlogin
cat /etc/security/failedlogin
who
alog -f /etc/security/failedlogin -o
第1题:
When configuring Cisco IOS login enhancements for virtual connections, what is the "quiet period"?()
第2题:
Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()
第3题:
A./var/adm/sulog
B./etc/syslog.conf
C./etc/security/sysck.cfg
D./etc/security/login.cfg
第4题:
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()
第5题:
For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()
第6题:
A user wants to be permanently added to the dba group. Which of the following commands or processes can be used to accomplish this()
第7题:
A System p administrator has created a customized security profile using AIX Security Expert. Which of the following commands will apply this to a system()
第8题:
A.fwtmp</etc/security/failedlogin
B.cat/etc/security/failedlogin
C.who
D.alog-f/etc/security/failedlogin-o
第9题:
An administrator is planning to bring a newly purchased server online. Which of the following should the administrator do FIRST?()
第10题:
An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()