IBM(000-235)

单选题The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()AAll messages at the emerg priority level and below from all facilities and messages at the crit prior

题目
单选题
The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()
A

 All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. 

B

 All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. 

C

 All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. 

D

 All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()

  • A、Physical
  • B、Logical
  • C、Software
  • D、Authentication

正确答案:A

第2题:

Which of the following are shared distribution tree characteristics? (Choose all that apply.)()

  • A、Memory requirements are higher for shared distribution tree than for source distribution tree
  • B、Creates a tree from a central RP to all last-hop routers
  • C、Uses a rendezvous point
  • D、An optimal path is created between each source router and each last-hop router
  • E、Place (S,G) entry in each router’s multicast routing table
  • F、Place (*,G) entry in a router’s multicast routing to table

正确答案:C,F

第3题:

Which of the following commands should be used to delete an entry from the /etc/inittab?()

A.xitab

B.rmitab

C.chitab

D.delitab


参考答案:B

第4题:

How can a directory be excluded from a mksysb backup of the following?()

  • A、Put an entry in the /etc/exclude.rootvg file
  • B、Put an entry in the /etc/mksysb.exclude file
  • C、Remove the directory’s entry from the mksysb /image.data file
  • D、Remove the directory’s entry from the /var/adm/ras/bosinst.data file

正确答案:A

第5题:

A blade server has been configured to boot from SAN.  After an HBA firmware upgrade the blade was rebooted and cannot find the operating system.  Which of the following should the administrator do NEXT to troubleshoot the issue?()

  • A、Verify all HBA settings.
  • B、Upgrade the blade firmware.
  • C、Upgrade the OS level HBA drivers.
  • D、Set the system to boot from the local disk.

正确答案:A

第6题:

As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you in what might happen if he issues the logging trap information command. Which of the following statement will answer his quest|on?()

  • A、Informational and debug messages are logged to the syslog server.
  • B、All messages are sent to the logging host, where selections are made.
  • C、An information trap is sent to the SNMP server.
  • D、All messages from emergencies to informational are sent to the logging host.

正确答案:D

第7题:

DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()

  • A、 validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP servers
  • B、 intercepts all ARP requests and responses on untrusted ports
  • C、 builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses
  • D、 uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts
  • E、 limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry

正确答案:A,C,D

第8题:

After applying a new ACL on a device, its CPU utilization rose significantly and many messages startingwith "%SEC-6-IPACCESSLOG" appeared on the Syslog server.What can be done to resolve this situation?()

  • A、Increase memory allocation for ACLs.
  • B、Remove all entries from the ACL and use a single permit ip any any statement.
  • C、Remove the log keyword from each ACL entry.
  • D、Reboot the device after the ACL has been applied.

正确答案:C

第9题:

At system install, the /etc/syslog.conf file specifies that messages be logged for which facilities?()

  • A、communications
  • B、kernel
  • C、security
  • D、none

正确答案:D

第10题:

Which of the following commands should be used to delete an entry from the /etc/inittab?()

  • A、xitab
  • B、rmitab
  • C、chitab
  • D、delitab

正确答案:B

更多相关问题