the PDACLD authentication audit log
the EchoClient log during token generation
IBM Tivoli Federated Identity Manager (ITFIM) tracing on AppSrv01 during token validation
ITFIM tracing on AppSrv03 during an attempted JAAS login
第1题:
Which statement is true regarding the Archiver (ARCn) process,archived log files,and recovery? ()
第2题:
What keywords do you need to the access-list to provide to the logging message like source address and source mac address?()
第3题:
Publishing was successful but the store won’t launch. Which log should be checked for errors after tracing has been enabled?()
第4题:
Which two statements are true regarding the database in ARCHIVELOG mode?()
第5题:
The instance abnormally terminates because of a power outage. Which statement is true about redolog files during instance recovery()
第6题:
Your boss at Supportcenter.cn wants you to clarify Oracle 10g. Which statement regarding the usage of redo log files during instance recovery is true? ()
第7题:
A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()
第8题:
the PDACLD authentication audit log
the EchoClient log during token generation
IBM Tivoli Federated Identity Manager (ITFIM) tracing on AppSrv01 during token validation
ITFIM tracing on AppSrv03 during an attempted JAAS login
第9题:
Configure a directory service access audit policy. Increase the maximum size of the security log.
Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.
Configure an object access audit policy for the directory. Increase the maximum size of the system log.
Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.
第10题:
Transactions are rolled back using redo log files.
Transactions are rolled forward using redo log files.
Transactions are rolled back using redo log files and archived log files.
Transactions are rolled forward using redo log files and rolled back using redo log files.
第11题:
You have to shut down the database to perform the backups.
Archiving information is written to the data files and redo log files.
You can perform complete database backups without closing the database.
Online redo log files have to be multiplexed before putting the database in ARCHIVELOG mode.
All the previous database backups become invalid after you configure the database to ARCHIVELOG mode.
第12题:
Syslogd creates error log entries in the system error log.
The default error log is stored in /var/adm/ras/error.log.
All entries in the error log are related to software problems.
Error logging is automatically enabled during system initialization.
第13题:
You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has the Routing and Remote Access service enabled and connects to the Internet by using a demand-dial connection. From the Routing and Remote Access snap-in, you open the properties of the server and enable the Log additional Routing and Remote Access information setting. You need to review the log file for issues related to the demand-dial connection. Which file should you review?()
第14题:
If an invalid username and password is entered on the EchoClient, which log files will be the first to record this (assuming all components have necessary logging and tracing enabled)?()
第15题:
Which of the following statements best describes error logging?()
第16题:
ASM supports all but which of the following file types?()
第17题:
The loss of which two types of files may require a recovery with the RESETLOGS option?()
第18题:
View the Exhibit.You executed the following command to perform a backup of the USERS tablespace: RMAN> BACKUP TABLESPACE USERS; Which three types of files are backed up? ()
第19题:
You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()
第20题:
%systemroot%/debug/netsetup.log
%systemroot%/debug/oakley.log
%systemroot%/tracing/ipnathlp.log
%systemroot%/tracing/ppp.log
第21题:
trace.log
message.txt
activity.log
trace.txt
SystemOut.log
第22题:
/smit.log
/smit.script
/var/log/smit.log
/.history
第23题:
service Authentication Manager
service Authorization
service Credentials
service Security Audit
第24题:
to add second factor based authentication to a Web application
to pre-populate user wallets with all their application credentials in one go
to enhance out-of-the-box audit logging by creating custom audit log events
to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On
to configure automatic password change on expiry for an application so that the new password is a random string of specified strength