Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()
第1题:
A.CiscoMIVR.log
B.CiscoMADM.log
C.CiscoMEDT.log
D.CiscoMCVD.log
第2题:
下面哪个log文件是属于CORBA的
第3题:
A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()
A. Connection Requests
B. System Errors
C. Enforcer Events
D. Enforcer Command Trace
第4题:
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has the Routing and Remote Access service enabled and connects to the Internet by using a demand-dial connection. From the Routing and Remote Access snap-in, you open the properties of the server and enable the Log additional Routing and Remote Access information setting. You need to review the log file for issues related to the demand-dial connection. Which file should you review?()
第5题:
日常故障处理时,在APG40中通过EventViewer,可以看到().
第6题:
A.System log
B.Security log
C.Audit log
D.Application log
第7题:
下面那个log文件是属于PONNBI北向系统的
第8题:
A. Events log
B. System log
C. User Access log
D. Admin Access log
第9题:
Your network consists of a single Active Directory domain that contains two domain controllers. Both domain controllers run Windows Server 2003 Service Pack 2 (SP2). Auditing of successful account logon events is enabled on all computers in the domain. You need to identify the last time a specific user logged on to the domain. What should you do?()
第10题:
Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements. What should your plan include?()