All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin.
All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin.
All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin.
All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.
第1题:
Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()
第2题:
Which of the following are shared distribution tree characteristics? (Choose all that apply.)()
第3题:
A.xitab
B.rmitab
C.chitab
D.delitab
第4题:
How can a directory be excluded from a mksysb backup of the following?()
第5题:
A blade server has been configured to boot from SAN. After an HBA firmware upgrade the blade was rebooted and cannot find the operating system. Which of the following should the administrator do NEXT to troubleshoot the issue?()
第6题:
As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you in what might happen if he issues the logging trap information command. Which of the following statement will answer his quest|on?()
第7题:
DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()
第8题:
After applying a new ACL on a device, its CPU utilization rose significantly and many messages startingwith "%SEC-6-IPACCESSLOG" appeared on the Syslog server.What can be done to resolve this situation?()
第9题:
At system install, the /etc/syslog.conf file specifies that messages be logged for which facilities?()
第10题:
Which of the following commands should be used to delete an entry from the /etc/inittab?()