CompTIA认证考试

Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor

题目

Which of the following would be used to monitor unauthorized access to data files?()

  • A、Performance Log and Alerts
  • B、Event Viewer
  • C、Security Configuration and Analysis
  • D、IP Security Monitor
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

单选题
Which of the following terms would best describe the temperature at which a liquid boils at a given pressure?()
A

Degree of saturation

B

Saturation temperature

C

Superheated temperature

D

Degree of superheat


正确答案: B
解析: 暂无解析

第2题:

多选题
Which of the following would be considered a routing protocol?()
A

OSPF

B

DHCP

C

SMTP

D

SNMP

E

RIP


正确答案: A,C
解析: 暂无解析

第3题:

Following a system boot,the display indicates that previously detected hardware is missing.  Which of the following commands would identify the missing hardware?()

  • A、diag
  • B、lscfg
  • C、cfgmgr
  • D、lsslot

正确答案:A

第4题:

Which of the following devices would MOST likely integrate a DHCP server?()

  • A、Router
  • B、Hub
  • C、Switch
  • D、Bridge

正确答案:A

第5题:

Which of the following storage protocols would be suitable for transport across an IP network?()

  • A、 SAS
  • B、 SCSI
  • C、 iSCSI
  • D、 SATA

正确答案:C

第6题:

Which of the following would BEST optimize a computer that is heavily used? ()

  • A、Scandisk
  • B、Defrag
  • C、Indexing
  • D、Chkdsk

正确答案:B

第7题:

Which of the following commands would be used to display the IP address on a UNIX/Linux computer?()

  • A、netstat
  • B、ipconfig
  • C、ifconfig
  • D、dig

正确答案:C

第8题:

Which of the following would be considered a routing protocol?()

  • A、OSPF
  • B、DHCP
  • C、SMTP
  • D、SNMP
  • E、RIP

正确答案:A,E