单选题A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A fwtmp  /etc/security/failedloginB cat /etc/security/fail

题目
单选题
A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()
A

fwtmp < /etc/security/failedlogin

B

cat /etc/security/failedlogin

C

who

D

alog -f /etc/security/failedlogin -o

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

When configuring Cisco IOS login enhancements for virtual connections, what is the "quiet period"?()

  • A、The period of time in which virtual login attempts are blocked, following repeated failed login attempts
  • B、The period of time in which virtual logins are blocked as security services fully initialize
  • C、A period of time when no one is attempting tolog in
  • D、The period of time between successive login attempts

正确答案:A

第2题:

Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()

  • A、/etc/security/user
  • B、/etc/services
  • C、/etc/inetd.conf
  • D、/etc/hosts.equiv

正确答案:C

第3题:

Asystemadministratorwasaskedtologinformationonpossiblesecuritybreachesonaserver.Whichfileshouldadditionalentriesbeaddedtocapturethisinformation?()

A./var/adm/sulog

B./etc/syslog.conf

C./etc/security/sysck.cfg

D./etc/security/login.cfg


参考答案:B

第4题:

A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()

  • A、fwtmp < /etc/security/failedlogin
  • B、cat /etc/security/failedlogin
  • C、who
  • D、alog -f /etc/security/failedlogin -o

正确答案:A

第5题:

For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()

  • A、Strategic security planning
  • B、Disaster recovery
  • C、Implementation security
  • D、Operations security

正确答案:D

第6题:

A  user  wants  to  be  permanently  added  to  the  dba  group.  Which  of  the  following  commands  or processes can be used to accomplish this()

  • A、chgrp
  • B、chuser
  • C、edit /etc/user
  • D、edit /etc/security/group

正确答案:B

第7题:

A System p administrator has created a customized security profile using AIX Security Expert.  Which of the following commands will apply this to a system()

  • A、aixpert -f mysec.xml
  • B、aixpert -a mysec.xml
  • C、chsec -f mysec.xml
  • D、chsec -a mysec.xml

正确答案:A

第8题:

ASystempadministratorisinvestigatingapossiblesecuritybreechandwantstoreviewinformationaboutfailedloginattemptstothesystem.Whichofthefollowingcommandswillshowthis()

A.fwtmp</etc/security/failedlogin

B.cat/etc/security/failedlogin

C.who

D.alog-f/etc/security/failedlogin-o


参考答案:A

第9题:

An administrator is planning to bring a newly purchased server online. Which of the following should the administrator do FIRST?()

  • A、Follow the pre-installation plan and procedures.
  • B、Review the system logs to check for errors.
  • C、Notify all users that the old system will be taken offline.
  • D、Apply all security updates to the system.

正确答案:A

第10题:

An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()

  • A、/var/adm/sulog
  • B、/etc/syslog.conf
  • C、/etc/security/sysck.cfg
  • D、/etc/security/syslog.conf

正确答案:B

更多相关问题