单选题Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()A /var/rmc/ctrmc.aclsB /etc/ctrmc/rsct.aclsC /etc/security/rsct.aclsD /usr/sbin/rsct/cfg/ctrmc.acls

题目
单选题
Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()
A

/var/rmc/ctrmc.acls

B

/etc/ctrmc/rsct.acls

C

/etc/security/rsct.acls

D

/usr/sbin/rsct/cfg/ctrmc.acls


相似考题
更多“单选题Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()A /var/rmc/ctrmc.aclsB /etc/ctrmc/rsct.aclsC /etc/security/rsct.aclsD /usr/sbin/rsct/cfg/ctrmc.acls”相关问题
  • 第1题:

    Which action changes the default editor for ALL users on the system from vi to edit of the following?()

    • A、Issue the command:  export EDITOR=/usr/bin/edit
    • B、Modify /.profile and change the EDITOR variable to /usr/bin/edit
    • C、Modify /etc/environment and add  EDITOR=/usr/bin/edit  export EDITOR
    • D、Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit

    正确答案:C

  • 第2题:

    Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()

    • A、/var/rmc/ctrmc.acls
    • B、/etc/ctrmc/rsct.acls
    • C、/etc/security/rsct.acls
    • D、/usr/sbin/rsct/cfg/ctrmc.acls

    正确答案:D

  • 第3题:

    Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()

    • A、/etc/security/user
    • B、/etc/security/passwd
    • C、/etc/security/mkuser.sys
    • D、/etc/security/mkuser.default

    正确答案:D

  • 第4题:

    Which of the following is the IBM-recommended method to start the Resource Management and Control (RMC) Services?()

    • A、rmcctrl -s
    • B、/etc/rc.rmc
    • C、startsrc -s rmc
    • D、/etc/tunables/nextboot

    正确答案:A

  • 第5题:

    The root id is set so that direct login is disabled.  Information must be reviewed relating to when root access was obtained.  In which of the following files is this information located?()

    • A、 /var/adm/sulog 
    • B、 /var/adm/wtmp 
    • C、 /etc/security/user 
    • D、 /etc/security/failedlogin

    正确答案:A

  • 第6题:

    单选题
    An application running on a production cluster failed over to the backup node, however, the DLPARintegration scripts failed. On inspection, it was discovered that the scripts failed as a result of /var being 100% full. The administratoradded more space to /var and ran the following command: Which of the following is the correct next action?()
    A

    Refresh the RMC daemon using rmcctrl

    B

    Refresh the RSCT subsystem using SRC

    C

    Recover from script failure using clruncmd

    D

    Reconfigure the RSCT subsystem using recfgct


    正确答案: A
    解析: 暂无解析

  • 第7题:

    单选题
    In order for DLPAR operations to be possible, the RMC daemons on the Hardware Management Console (HMC) must communicate with the RMC daemons on all of the LPARs involved. How can the RMC daemons be restarted on the HMC, causing the least disruption?()
    A

    Run /usr/sbin/rsct/bin/rmcctrl z as hscroot. 

    B

    Reboot the HMC, either through the GUI or via the command line. 

    C

    Disable and re-enable RMC in the Firewall settings in the HMC GUI. 

    D

    Select the Partition Communication checkbox in the LAN Adapter dialogue box.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()
    A

    /var/adm/sulog

    B

    /etc/syslog.conf

    C

    /etc/security/sysck.cfg

    D

    /etc/security/login.cfg


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()
    A

    IETF

    B

    PFC

    C

    TCAM

    D

    ASIC


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()
    A

    /var/adm/sulog

    B

    /etc/syslog.conf

    C

    /etc/security/sysck.cfg

    D

    /etc/security/syslog.conf


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    The root id is set so that direct login is disabled.  Information must be reviewed relating to when root access was obtained.  In which of the following files is this information located?()
    A

     /var/adm/sulog 

    B

     /var/adm/wtmp 

    C

     /etc/security/user 

    D

     /etc/security/failedlogin


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()
    A

    /etc/security/user

    B

    /etc/security/passwd

    C

    /etc/security/mkuser.sys

    D

    /etc/security/mkuser.default


    正确答案: A
    解析: 暂无解析

  • 第13题:

    With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()

    • A、IETF
    • B、PFC
    • C、TCAM
    • D、ASIC

    正确答案:B

  • 第14题:

    An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()

    • A、/var/adm/sulog
    • B、/etc/syslog.conf
    • C、/etc/security/sysck.cfg
    • D、/etc/security/syslog.conf

    正确答案:B

  • 第15题:

    What is the default configuration file used by the syslogd daemon?()

    • A、 /etc/syslog.h 
    • B、 /etc/syslog.pid 
    • C、 /usr/sbin/syslogd 
    • D、 /etc/syslog.conf

    正确答案:D

  • 第16题:

    A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()

    • A、/etc/security/limits
    • B、/etc/security/mkuser.sys
    • C、/etc/security/priv
    • D、/etc/security/user

    正确答案:D

  • 第17题:

    A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()

    • A、/var/adm/sulog
    • B、/etc/syslog.conf
    • C、/etc/security/sysck.cfg
    • D、/etc/security/login.cfg

    正确答案:B

  • 第18题:

    单选题
    Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()
    A

    /var/rmc/ctrmc.acls

    B

    /etc/ctrmc/rsct.acls

    C

    /etc/security/rsct.acls

    D

    /usr/sbin/rsct/cfg/ctrmc.acls


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    If a kill -9 is performed on the clstrmgrES process, the default action is to halt the system. Tochange the default action to do something other then halting the system, which of the following files must be modified?()
    A

     /usr/es/sbin/cluster/etc/clexit.rc

    B

     /usr/es/sbin/cluster/etc/hacmp.term

    C

     /usr/es/sbin/cluster/etc/rc.cluster

    D

     /usr/es/sbin/cluster/etc/rc.shutdown


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()
    A

    /etc/security/limits

    B

    /etc/security/mkuser.sys

    C

    /etc/security/priv

    D

    /etc/security/user


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    What is the default configuration file used by the syslogd daemon?()
    A

     /etc/syslog.h 

    B

     /etc/syslog.pid 

    C

     /usr/sbin/syslogd 

    D

     /etc/syslog.conf


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    During the boot process, which of the following files should be sued to control system initialization and start daemons and subsystems?()
    A

    /etc/inittab

    B

    /etc/rc.boot

    C

    /etc/services

    D

    /etc/environment


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following is the IBM-recommended method to start the Resource Management and Control (RMC) Services?()
    A

    rmcctrl -s

    B

    /etc/rc.rmc

    C

    startsrc -s rmc

    D

    /etc/tunables/nextboot


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    Which action changes the default editor for ALL users on the system from vi to edit of the following?()
    A

    Issue the command:  export EDITOR=/usr/bin/edit

    B

    Modify /.profile and change the EDITOR variable to /usr/bin/edit

    C

    Modify /etc/environment and add  EDITOR=/usr/bin/edit  export EDITOR

    D

    Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit


    正确答案: C
    解析: 暂无解析