audit
syslog
TCB
sysck
第1题:
You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()
第2题:
An administrator suspects that an incorrect POTS line is carrying the DSL signal. Which of thefollowing will help diagnose this issue?()
第3题:
“敏感探测区域”的英文写法( )
A.Sensitive area detection
B.Sensitive detection area
C.Sensitive detion area
D.Sensitive area detion
第4题:
Users complain they cannot communicate with a server. The system administrator suspects there may be a problem with the Ethernet adapter or with the way it is configured. Which command can be run to verify the adapter is configured correctly?()
第5题:
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()
第6题:
Which two statements about the best effort model for QoS are true?()
第7题:
Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()
第8题:
1f someone asked me to be in a movie,l'd say yes.(对划线部分提问)
_________ would you_________ if someone asked you_________ _________in a movie?
第9题:
A System p administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect. Which of the following commands can be used to determine the block size of the backup tape ()
第10题:
A system administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect. Which of the following commands can be used to determine the block size of the backup tape?()