A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/u

题目

A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()

  • A、/etc/security/limits
  • B、/etc/security/mkuser.sys
  • C、/etc/security/priv
  • D、/etc/security/user

相似考题
更多“A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/us”相关问题
  • 第1题:

    Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()

    • A、/etc/security/user
    • B、/etc/services
    • C、/etc/inetd.conf
    • D、/etc/hosts.equiv

    正确答案:C

  • 第2题:

    A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()

    • A、remove all other groups from the system
    • B、run the command mkuser -default "GROUP=database"
    • C、change the default group in /usr/lib/security/mkuser.default
    • D、edit /etc/security/group to move all users to the database stanza

    正确答案:C

  • 第3题:

    An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()

    • A、/var/adm/sulog
    • B、/etc/syslog.conf
    • C、/etc/security/sysck.cfg
    • D、/etc/security/syslog.conf

    正确答案:B

  • 第4题:

    Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。

    • A、~/ .rhosts
    • B、$HOME/.netrc
    • C、/etc/hosts.equiv
    • D、/etc/security/user

    正确答案:B

  • 第5题:

    The root id is set so that direct login is disabled.  Information must be reviewed relating to when root access was obtained.  In which of the following files is this information located?()

    • A、 /var/adm/sulog 
    • B、 /var/adm/wtmp 
    • C、 /etc/security/user 
    • D、 /etc/security/failedlogin

    正确答案:A

  • 第6题:

    The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()  

    • A、 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.
    • B、 Use C-SPOC to synchronize the password files between cluster nodes.
    • C、 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.
    • D、 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

    正确答案:A

  • 第7题:

    AIX中下面哪个文件包含了UID、HOME目录及shell信息()。

    • A、/etc/passwd
    • B、/etc/security/passwd
    • C、/etc/security/environ
    • D、/etc/security/user

    正确答案:A

  • 第8题:

    单选题
    Which files are managed through the use of the file collection "HACMP_Files"?()
    A

    The PowerHA Global ODM.

    B

    System networking files including /etc/hosts, /etc/inetd.conf and /etc/services

    C

    Security files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/group

    D

    User configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()
    A

    /etc/security/limits

    B

    /etc/security/mkuser.sys

    C

    /etc/security/priv

    D

    /etc/security/user


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()
    A

    /var/adm/sulog

    B

    /etc/syslog.conf

    C

    /etc/security/sysck.cfg

    D

    /etc/security/syslog.conf


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    The root id is set so that direct login is disabled.  Information must be reviewed relating to when root access was obtained.  In which of the following files is this information located?()
    A

     /var/adm/sulog 

    B

     /var/adm/wtmp 

    C

     /etc/security/user 

    D

     /etc/security/failedlogin


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()
    A

    /etc/security/user

    B

    /etc/security/passwd

    C

    /etc/security/mkuser.sys

    D

    /etc/security/mkuser.default


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which action changes the default editor for ALL users on the system from vi to edit of the following?()

    • A、Issue the command:  export EDITOR=/usr/bin/edit
    • B、Modify /.profile and change the EDITOR variable to /usr/bin/edit
    • C、Modify /etc/environment and add  EDITOR=/usr/bin/edit  export EDITOR
    • D、Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit

    正确答案:C

  • 第14题:

    A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()

    • A、fwtmp < /etc/security/failedlogin
    • B、cat /etc/security/failedlogin
    • C、who
    • D、alog -f /etc/security/failedlogin -o

    正确答案:A

  • 第15题:

    Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()

    • A、/etc/security/user
    • B、/etc/security/passwd
    • C、/etc/security/mkuser.sys
    • D、/etc/security/mkuser.default

    正确答案:D

  • 第16题:

    Which files are managed through the use of the file collection "HACMP_Files"?()

    • A、The PowerHA Global ODM.
    • B、System networking files including /etc/hosts, /etc/inetd.conf and /etc/services
    • C、Security files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/group
    • D、User configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts

    正确答案:D

  • 第17题:

    An  administrator  notices  the  /  filesystem  is  98%  full.   Which  of  the  following  files  commonly  grow  rapidly()

    • A、/var/adm/wtmp
    • B、/etc/security/failedlogin
    • C、/smit.script
    • D、/proc

    正确答案:B

  • 第18题:

    A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()

    • A、/var/adm/sulog
    • B、/etc/syslog.conf
    • C、/etc/security/sysck.cfg
    • D、/etc/security/login.cfg

    正确答案:B

  • 第19题:

    单选题
    A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()
    A

    remove all other groups from the system

    B

    run the command mkuser -default GROUP=database

    C

    change the default group in /usr/lib/security/mkuser.default

    D

    edit /etc/security/group to move all users to the database stanza


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()
    A

    /var/adm/sulog

    B

    /etc/syslog.conf

    C

    /etc/security/sysck.cfg

    D

    /etc/security/login.cfg


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。
    A

    ~/ .rhosts

    B

    $HOME/.netrc

    C

    /etc/hosts.equiv

    D

    /etc/security/user


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()
    A

    /etc/security/user

    B

    /etc/services

    C

    /etc/inetd.conf

    D

    /etc/hosts.equiv


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()
    A

     On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.

    B

     Use C-SPOC to synchronize the password files between cluster nodes.

    C

     On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.

    D

     On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.


    正确答案: A
    解析: 暂无解析