单选题A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A /var/adm/sulogB /etc/syslog.confC /etc/security/sysck.cfgD /etc/security/login.

题目
单选题
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()
A

/var/adm/sulog

B

/etc/syslog.conf

C

/etc/security/sysck.cfg

D

/etc/security/login.cfg

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Therootidissetsothatdirectloginisdisabled.Informationmustbereviewedrelatingtowhenrootaccesswasobtained.Inwhichofthefollowingfilesisthisinformationlocated?()

A./var/adm/sulog

B./var/adm/wtmp

C./etc/security/user

D./etc/security/failedlogin


参考答案:A

第2题:

Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()

  • A、/etc/security/user
  • B、/etc/services
  • C、/etc/inetd.conf
  • D、/etc/hosts.equiv

正确答案:C

第3题:

Asystemadministratorwasaskedtologinformationonpossiblesecuritybreachesonaserver.Whichfileshouldadditionalentriesbeaddedtocapturethisinformation?()

A./var/adm/sulog

B./etc/syslog.conf

C./etc/security/sysck.cfg

D./etc/security/login.cfg


参考答案:B

第4题:

A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()

  • A、Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.
  • B、Increase the number of licenses; using smit chaili cense
  • C、Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.
  • D、Change User can logi field from false to true: using smit chuser.

正确答案:B

第5题:

A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()

  • A、fwtmp < /etc/security/failedlogin
  • B、cat /etc/security/failedlogin
  • C、who
  • D、alog -f /etc/security/failedlogin -o

正确答案:A

第6题:

A  user  wants  to  be  permanently  added  to  the  dba  group.  Which  of  the  following  commands  or processes can be used to accomplish this()

  • A、chgrp
  • B、chuser
  • C、edit /etc/user
  • D、edit /etc/security/group

正确答案:B

第7题:

A system administrator noticed several error messages on the screen while the system was booting up; but was not able to write them down. Where should the system administrator look for the console log, assuming it is in the default location?()

  • A、/tmp/conslog
  • B、/etc/console.log
  • C、/var/adm/ras/conslog
  • D、/var/ras/console.log

正确答案:C

第8题:

ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis()

A./etc/security/limits

B./etc/security/mkuser.sys

C./etc/security/priv

D./etc/security/user


参考答案:D

第9题:

Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()

  • A、/var/rmc/ctrmc.acls
  • B、/etc/ctrmc/rsct.acls
  • C、/etc/security/rsct.acls
  • D、/usr/sbin/rsct/cfg/ctrmc.acls

正确答案:D

第10题:

An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()

  • A、/var/adm/sulog
  • B、/etc/syslog.conf
  • C、/etc/security/sysck.cfg
  • D、/etc/security/syslog.conf

正确答案:B

更多相关问题