单项选择题
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.
Which of the following AIX component accomplishes this()
A.audit
B.syslog
C.TCB
D.sysck
相关考题
-
单项选择题
A user reports that they cannot cd to /tmp/application. A system administrator entered the following command: Is -Id /tmp/application drw-r-r- 4 root system 512 Jan 15 14:09 application Which of the following is the most likely cause of the problem()
A.The /tmp/application should be globally writable.
B.The /tmp/application directory should be executable.
C.The /tmp/application directory should be owned by the user.
D.The /tmp/application directory should have the sticky bit set -
单项选择题
An administrator performs a full backup every Saturday evening and daily incremental backups the rest of the week. The system failed on Thursday and must be restored. Which backup tapes will be required to restore the system to its most recent recoverable state()
A.Saturday’s full backup tape
B.Wednesday’s backup tape
C.Saturday’s full backup and Wednesday’s incremental backup tapes
D.Saturday’s full backup and Sunday’s through Wednesday’s incremental backup tapes -
单项选择题
Howcanadirectorynamed/dirlbeexcludedduringarestoreoffilesbackedupbynamewiththebackupcommand()
A.By using the restore -x option followed by /dirl
B.By adding an entry in the /etc/restore.exclude file
C.By using the restore -i option to enter interactive mode and executing the command:delete /dirl
D.By using the restore -i option when running restore to specify a text file containing ’/dirl1 as one of the lines in it
