An administrator suspects someone is modifying a sensitive f

题目
单选题
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.  Which of the following AIX component accomplishes this()
A

audit

B

syslog

C

TCB

D

sysck

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()

  • A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.
  • B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.
  • C、Use Windows Explorer to turn on auditing for the specific files. 
  • D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.
  • E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.
  • F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on. 

正确答案:A

第2题:

An administrator suspects that an incorrect POTS line is carrying the DSL signal. Which of thefollowing will help diagnose this issue?()

  • A、Multimeter
  • B、Toner probe
  • C、Protocol analyzer
  • D、Butt set

正确答案:D

第3题:

“敏感探测区域”的英文写法( )

A.Sensitive area detection

B.Sensitive detection area

C.Sensitive detion area

D.Sensitive area detion


正确答案:B

第4题:

Users complain they cannot communicate with a server.  The system administrator suspects there may be a problem with the Ethernet adapter or with the way it is configured.  Which command can be run to verify the adapter is configured correctly?()

  • A、netstat -in
  • B、ifconfig -a
  • C、arp -a
  • D、cfgmgr

正确答案:B

第5题:

An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()

  • A、audit
  • B、syslog
  • C、TCB
  • D、sysck

正确答案:A

第6题:

Which two statements about the best effort model for QoS are true?()

  • A、delay sensitive packets are given preferential treatment
  • B、the default policy identifies a delay sensitive class and default class
  • C、the default policy identifies a delay sensitive class, best effort class, and default class
  • D、the model is highly scalable
  • E、the model is still predominant on the internet F the model provides guaranteed service

正确答案:D,E

第7题:

Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()

  • A、dig company.com ns
  • B、ipconfig/all
  • C、ifconfig-a
  • D、dig company.com mx

正确答案:A

第8题:

1f someone asked me to be in a movie,l'd say yes.(对划线部分提问)

_________ would you_________ if someone asked you_________ _________in a movie?


正确答案:
 38. What;do;to be

第9题:

A System p administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect.  Which of the following commands can be used to determine the block size of the backup tape ()

  • A、dd
  • B、tar
  • C、cpio
  • D、restore

正确答案:A

第10题:

A system administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect. Which of the following commands can be used to determine the block size of the backup tape?()

  • A、dd
  • B、tar
  • C、cpio
  • D、restore

正确答案:A

更多相关问题