/var/adm/sulog
/etc/syslog.conf
/etc/security/sysck.cfg
/etc/security/syslog.conf
第1题:
A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface. Which of the following files would show the commands that have been performed from within smit and their resulting output()
第2题:
The production database has been functional for the last seven days. Because of application requirements, some of the initialization parameters were changed during run time without any comments. You have asked to find out the value of the parameters when the instance was started.Which source would you use to locate this information?()
第3题:
You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.
You want to upgrade all of the critical system files and patches on the server in the shortest possible time.
What should you do?
A.Use Windows Update.
B.Run System File Checker.
C.Log on as administrator and run Windows Update.
D.Log on as administrator and run System File Checker.
第4题:
An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()
第5题:
A customer reports the optical drive is no longer responding. Which of the following questionsshould be asked FIRST?()
第6题:
Where do you find information about a missing redo log file?()
第7题:
An administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface. Which file would show the commands that have been performed from within smit and their resulting output?()
第8题:
An administrator created a WebSphere Commerce instance but the site is not performing properly. The log messages don’t give enough information to determine the problem. Which tool is used to configure tracing of WebSphere Commerce?()
第9题:
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()
第10题:
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()