单选题The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()AAll messages at the emerg priority level and below from all facilities and messages at the crit prior

题目
单选题
The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()
A

 All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. 

B

 All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. 

C

 All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. 

D

 All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.


相似考题
更多“单选题The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()A  All messages at the emerg priority level and below from all facilities and messages at the crit pri”相关问题
  • 第1题:

    Which of the following are shared distribution tree characteristics? (Choose all that apply.)()

    • A、Memory requirements are higher for shared distribution tree than for source distribution tree
    • B、Creates a tree from a central RP to all last-hop routers
    • C、Uses a rendezvous point
    • D、An optimal path is created between each source router and each last-hop router
    • E、Place (S,G) entry in each router’s multicast routing table
    • F、Place (*,G) entry in a router’s multicast routing to table

    正确答案:C,F

  • 第2题:

    A blade server has been configured to boot from SAN.  After an HBA firmware upgrade the blade was rebooted and cannot find the operating system.  Which of the following should the administrator do NEXT to troubleshoot the issue?()

    • A、Verify all HBA settings.
    • B、Upgrade the blade firmware.
    • C、Upgrade the OS level HBA drivers.
    • D、Set the system to boot from the local disk.

    正确答案:A

  • 第3题:

    How can a directory be excluded from a mksysb backup of the following?()

    • A、Put an entry in the /etc/exclude.rootvg file
    • B、Put an entry in the /etc/mksysb.exclude file
    • C、Remove the directory’s entry from the mksysb /image.data file
    • D、Remove the directory’s entry from the /var/adm/ras/bosinst.data file

    正确答案:A

  • 第4题:

    Which procedure should be used to configure the system to prevent all users from using the ’at’ command()?  

    • A、Create a /var/adm/cron/at.allow file with no entries
    • B、Create a /var/adm/cron/at.deny file with ’*’ as the only entry
    • C、Create a /var/adm/at/at.deny file with ’ALL’ as the only entry
    • D、Create a /var/adm/at/at.allow file with ’NONE’ as the only entry

    正确答案:A

  • 第5题:

    Your PROD database has been started using the server parameter file. In your PROD database you are using RMAN for backup and recovery operations. You issue the following commands from the RMAN prompt:     RMAN> CONFIGURE CONTROLFILE AUTOBACKUP OFF;   RMAN> BACKUP DATABASE;   Which files from the database will be backed up as a result of this BACKUP command?()

    • A、 control file
    • B、 all datafiles
    • C、 password file
    • D、 online redo log file
    • E、 archive redo log file
    • F、 server parameter file
    • G、 only the SYSTEM datafile

    正确答案:A,B,F

  • 第6题:

    单选题
    How can a directory be excluded from a mksysb backup of the following?()
    A

    Put an entry in the /etc/exclude.rootvg file

    B

    Put an entry in the /etc/mksysb.exclude file

    C

    Remove the directory’s entry from the mksysb /image.data file

    D

    Remove the directory’s entry from the /var/adm/ras/bosinst.data file


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    A blade server has been configured to boot from SAN.  After an HBA firmware upgrade the blade was rebooted and cannot find the operating system.  Which of the following should the administrator do NEXT to troubleshoot the issue?()
    A

    Verify all HBA settings.

    B

    Upgrade the blade firmware.

    C

    Upgrade the OS level HBA drivers.

    D

    Set the system to boot from the local disk.


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    You are an administrator in a company that has a Main Office and 5 branch offices.In every branch office exist a Hub Transport server, and only in Main Office exists an Edge server.You add a disclaimer to all internal and external e-mail messages sent by users in the company. You discover that e-mail messages sent from one of Branch Offices do not include the disclaimer.You need to ensure that all e-mail messages include disclaimer.What should you do?()
    A

    Restart Microsoft Exchange System Attendant

    B

    Modify cache settings of Branch Offices Hub Transport Server

    C

    Force Active Directory replication on the Branch Office Domain Controller

    D

    Export all transport rules from the Hub Transport Server in Main Office import the transport rules in the branch office Hub Transport Server


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following commands should be used to delete an entry from the /etc/inittab?()
    A

    xitab

    B

    rmitab

    C

    chitab

    D

    delitab


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    After applying a new ACL on a device, its CPU utilization rose significantly and many messages starting with "%SEC-6-IPACCESSLOG" appeared on the Syslog server. What can be done to resolve this situation?()
    A

    Increase memory allocation for ACLs.

    B

    Remove all entries from the ACL and use a single permit ip any any statement.

    C

    Remove the log keyword from each ACL entry.

    D

    Reboot the device after the ACL has been applied.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    A system has a TCPIP issue that is a known problem. The newest code from the support website has been downloaded to resolve the issue. Which of the following commands should be used to install the new code?()
    A

    smitty install_commit

    B

    installp -ugV

    C

    installp -aX

    D

    instfix -all


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()
    A

    Physical

    B

    Logical

    C

    Software

    D

    Authentication


    正确答案: C
    解析: 暂无解析

  • 第13题:

    DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()

    • A、 validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP servers
    • B、 intercepts all ARP requests and responses on untrusted ports
    • C、 builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses
    • D、 uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts
    • E、 limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry

    正确答案:A,C,D

  • 第14题:

    At system install, the /etc/syslog.conf file specifies that messages be logged for which facilities?()

    • A、communications
    • B、kernel
    • C、security
    • D、none

    正确答案:D

  • 第15题:

    Which of the following commands should be used to delete an entry from the /etc/inittab?()

    • A、xitab
    • B、rmitab
    • C、chitab
    • D、delitab

    正确答案:B

  • 第16题:

    The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()

    • A、 All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. 
    • B、 All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. 
    • C、 All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. 
    • D、 All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.

    正确答案:C

  • 第17题:

    You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The organization contains five Hub Transport servers.All of the Hub Transport servers are listed as source servers for a Send connector to the Internet.  You need to prevent a Hub Transport server named Hubl from sending and receiving e-mail messages from the Internet.The solution must meet the following requirements:  (1)Ensure that Mailbox servers can deliver e-mail messages to Hub1. (2)Ensure that all other Hub Transport servers can deliver e-mail messages to the Internet. What should you do on Hub1?()

    • A、Suspend all message queues.
    • B、Stop the Microsoft Exchange Transport service.
    • C、Disable all Receive connectors and Send connectors.
    • D、Stop the Microsoft Exchange Mail Submission Service.

    正确答案:A

  • 第18题:

    单选题
    A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?()
    A

    Multicasting

    B

    Proxy server

    C

    NAT

    D

    Subnetting


    正确答案: C
    解析: 暂无解析

  • 第19题:

    多选题
    For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).
    A

    Disable all 802.11 traffic

    B

    Disable the SSID from broadcasting

    C

    Disable WPA

    D

    Enable Bluetooth only communication

    E

    Change the default admin password

    F

    Disable WEP


    正确答案: B,E
    解析: 暂无解析

  • 第20题:

    单选题
    Which procedure should be used to configure the system to prevent all users from using the ’at’ command()?
    A

    Create a /var/adm/cron/at.allow file with no entries

    B

    Create a /var/adm/cron/at.deny file with ’*’ as the only entry

    C

    Create a /var/adm/at/at.deny file with ’ALL’ as the only entry

    D

    Create a /var/adm/at/at.allow file with ’NONE’ as the only entry


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The organization contains five Hub Transport servers.All of the Hub Transport servers are listed as source servers for a Send connector to the Internet.  You need to prevent a Hub Transport server named Hubl from sending and receiving e-mail messages from the Internet.The solution must meet the following requirements:  (1)Ensure that Mailbox servers can deliver e-mail messages to Hub1. (2)Ensure that all other Hub Transport servers can deliver e-mail messages to the Internet. What should you do on Hub1?()
    A

    Suspend all message queues.

    B

    Stop the Microsoft Exchange Transport service.

    C

    Disable all Receive connectors and Send connectors.

    D

    Stop the Microsoft Exchange Mail Submission Service.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()
    A

     All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. 

    B

     All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. 

    C

     All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. 

    D

     All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()
    A

    REVOKE ALL PRIVILEGES FROM USER tom

    B

    REVOKE ALL ON EMPLOYEE FROM USER tom

    C

    REVOKE EXECUTE ON EMPLOYEE FROM USER tom

    D

    REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    At system install, the /etc/syslog.conf file specifies that messages be logged for which facilities?()
    A

    communications

    B

    kernel

    C

    security

    D

    none


    正确答案: C
    解析: 暂无解析