单选题If an invalid username and password is entered on the EchoClient, which log files will be the first to record this (assuming all components have necessary logging and tracing enabled)?()A the PDACLD authentication audit logB the EchoClient log during t

题目
单选题
If an invalid username and password is entered on the EchoClient, which log files will be the first to record this (assuming all components have necessary logging and tracing enabled)?()
A

the PDACLD authentication audit log

B

the EchoClient log during token generation

C

IBM Tivoli Federated Identity Manager (ITFIM) tracing on AppSrv01 during token validation

D

ITFIM tracing on AppSrv03 during an attempted JAAS login


相似考题
更多“单选题If an invalid username and password is entered on the EchoClient, which log files will be the first to record this (assuming all components have necessary logging and tracing enabled)?()A the PDACLD authentication audit logB the EchoClient log during t”相关问题
  • 第1题:

    Which statement is true regarding the Archiver (ARCn) process,archived log files,and recovery? ()

    • A、A database backup, combined with archived redo log files, guarantees that all committed data can be recovered to the point of failure. 
    • B、During recovery the ARCn background process copies its redo entries identified for recovery by the control file to the data files. 
    • C、After each write to an archived log, the mandatory background process ARCn writes its log sequence number and the first and last SCN number within the log sequence to the control file. 
    • D、At database recover time, and archived redo log is uniquely identified for recovery use by its redo thread number and destination ID number retrieved from the control file.

    正确答案:A

  • 第2题:

    What keywords do you need to the access-list to provide to the logging message like source address and source mac address?()

    • A、Log
    • B、Log-input
    • C、Log-output
    • D、Logging

    正确答案:B

  • 第3题:

    Publishing was successful but the store won’t launch.  Which log should be checked for errors after tracing has been enabled?()

    • A、trace.log
    • B、message.txt
    • C、activity.log
    • D、trace.txt
    • E、SystemOut.log

    正确答案:A,C

  • 第4题:

    Which two statements are true regarding the database in ARCHIVELOG mode?()

    • A、You have to shut down the database to perform the backups.
    • B、Archiving information is written to the data files and redo log files.
    • C、You can perform complete database backups without closing the database.
    • D、Online redo log files have to be multiplexed before putting the database in ARCHIVELOG mode.
    • E、All the previous database backups become invalid after you configure the database to ARCHIVELOG mode.

    正确答案:C,E

  • 第5题:

    The instance abnormally terminates because of a power outage. Which statement is true about redolog files during instance recovery()

    • A、Inactive and current redo log files are required to accomplish recovery.
    • B、Online and archived redo log files are required to accomplish instance recovery.
    • C、All redo log entries after the last checkpoint are applied from redo log files to data files.
    • D、All redo log entries recorded in the current redo log file until the checkpoint position are applied to datafiles.

    正确答案:C

  • 第6题:

    Your boss at Supportcenter.cn wants you to clarify Oracle 10g. Which statement regarding the usage of redo log files during instance recovery is true? ()

    • A、Transactions are rolled back using redo log files.
    • B、Transactions are rolled forward using redo log files.
    • C、Transactions are rolled back using redo log files and archived log files.
    • D、Transactions are rolled forward using redo log files and rolled back using redo log files.

    正确答案:B

  • 第7题:

    A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()

    • A、service Authentication Manager
    • B、service Authorization
    • C、service Credentials
    • D、service Security Audit

    正确答案:D

  • 第8题:

    单选题
    You have a server that runs Windows Server 2003 Service Pack 2 (SP2).  The server has the Routing and Remote Access service enabled and connects to the Internet by using a demand-dial connection. From the Routing and Remote Access snap-in, you open the properties of the server and enable the Log additional Routing and Remote Access information setting. You need to review the log file for issues related to the demand-dial connection.  Which file should you review?()
    A

    %systemroot%/debug/netsetup.log

    B

    %systemroot%/debug/oakley.log

    C

    %systemroot%/tracing/ipnathlp.log

    D

    %systemroot%/tracing/ppp.log


    正确答案: D
    解析: 暂无解析

  • 第9题:

    多选题
    Publishing was successful but the store won’t launch.  Which log should be checked for errors after tracing has been enabled?()
    A

    trace.log

    B

    message.txt

    C

    activity.log

    D

    trace.txt

    E

    SystemOut.log


    正确答案: A,C
    解析: 暂无解析

  • 第10题:

    单选题
    A System p administrator needs to document system changes that have occurred recently. The company has a policy of making all possible changes via the smit interface.  Which of the following files would show the commands that have been performed from within smit and their resulting output()
    A

    /smit.log

    B

    /smit.script

    C

    /var/log/smit.log

    D

    /.history


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()
    A

    service Authentication Manager

    B

    service Authorization

    C

    service Credentials

    D

    service Security Audit


    正确答案: C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    to add second factor based authentication to a Web application

    B

    to pre-populate user wallets with all their application credentials in one go

    C

    to enhance out-of-the-box audit logging by creating custom audit log events

    D

    to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On

    E

    to configure automatic password change on expiry for an application so that the new password is a random string of specified strength


    正确答案: B,C
    解析: 暂无解析

  • 第13题:

    You have a server that runs Windows Server 2003 Service Pack 2 (SP2).  The server has the Routing and Remote Access service enabled and connects to the Internet by using a demand-dial connection. From the Routing and Remote Access snap-in, you open the properties of the server and enable the Log additional Routing and Remote Access information setting. You need to review the log file for issues related to the demand-dial connection.  Which file should you review?()

    • A、%systemroot%/debug/netsetup.log
    • B、%systemroot%/debug/oakley.log
    • C、%systemroot%/tracing/ipnathlp.log
    • D、%systemroot%/tracing/ppp.log

    正确答案:D

  • 第14题:

    If an invalid username and password is entered on the EchoClient, which log files will be the first to record this (assuming all components have necessary logging and tracing enabled)?()

    • A、the PDACLD authentication audit log
    • B、the EchoClient log during token generation
    • C、IBM Tivoli Federated Identity Manager (ITFIM) tracing on AppSrv01 during token validation
    • D、ITFIM tracing on AppSrv03 during an attempted JAAS login

    正确答案:A

  • 第15题:

    Which of the following statements best describes error logging?()

    • A、Syslogd creates error log entries in the system error log. 
    • B、The default error log is stored in /var/adm/ras/error.log. 
    • C、All entries in the error log are related to software problems. 
    • D、Error logging is automatically enabled during system initialization.

    正确答案:D

  • 第16题:

    ASM supports all but which of the following file types?()

    • A、 Database files
    • B、 Spfiles
    • C、 Redo-log files
    • D、 Archived log files
    • E、 RMAN backup sets
    • F、 Password files
    • G、 init.ora files

    正确答案:F,G

  • 第17题:

    The loss of which two types of files may require a recovery with the RESETLOGS option?()

    • A、 control files
    • B、 password file
    • C、 archived log files
    • D、 system-critical data files for which all the redo entries are present
    • E、 non-system-critical data files for which all the redo entries are present

    正确答案:A,C

  • 第18题:

    View the Exhibit.You executed the following command to perform a backup of the USERS tablespace: RMAN> BACKUP TABLESPACE USERS;  Which three types of files are backed up? ()

    • A、 all the data files belonging to the USERS tablespace
    • B、 password file
    • C、 online redo log files
    • D、 the current control file
    • E、 archived redo log files
    • F、 the current server parameter file
    • G、 data files belonging to the USERS tablespace and all the default tablespaces

    正确答案:A,D,F

  • 第19题:

    You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()

    • A、stop all running instances of PDACLD
    • B、log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) user
    • C、change the TAMeb ACL policy applying to the Web Services namespace
    • D、update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console

    正确答案:C

  • 第20题:

    单选题
    Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()
    A

     Configure a directory service access audit policy. Increase the maximum size of the security log.

    B

     Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.

    C

     Configure an object access audit policy for the directory. Increase the maximum size of the system log.

    D

     Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    Your boss at Supportcenter.cn wants you to clarify Oracle 10g. Which statement regarding the usage of redo log files during instance recovery is true? ()
    A

    Transactions are rolled back using redo log files.

    B

    Transactions are rolled forward using redo log files.

    C

    Transactions are rolled back using redo log files and archived log files.

    D

    Transactions are rolled forward using redo log files and rolled back using redo log files.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are true regarding the database in ARCHIVELOG mode?()
    A

    You have to shut down the database to perform the backups.

    B

    Archiving information is written to the data files and redo log files.

    C

    You can perform complete database backups without closing the database.

    D

    Online redo log files have to be multiplexed before putting the database in ARCHIVELOG mode.

    E

    All the previous database backups become invalid after you configure the database to ARCHIVELOG mode.


    正确答案: E,C
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following statements best describes error logging?()
    A

    Syslogd creates error log entries in the system error log. 

    B

    The default error log is stored in /var/adm/ras/error.log. 

    C

    All entries in the error log are related to software problems. 

    D

    Error logging is automatically enabled during system initialization.


    正确答案: C
    解析: 暂无解析