/var/adm/sulog
/etc/syslog.conf
/etc/security/sysck.cfg
/etc/security/login.cfg
第1题:
A./var/adm/sulog
B./var/adm/wtmp
C./etc/security/user
D./etc/security/failedlogin
第2题:
Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()
第3题:
A./var/adm/sulog
B./etc/syslog.conf
C./etc/security/sysck.cfg
D./etc/security/login.cfg
第4题:
A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()
第5题:
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()
第6题:
A user wants to be permanently added to the dba group. Which of the following commands or processes can be used to accomplish this()
第7题:
A system administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location?()
第8题:
A./etc/security/limits
B./etc/security/mkuser.sys
C./etc/security/priv
D./etc/security/user
第9题:
Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()
第10题:
An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()