单选题Which of the following logs contains information on overall performance and events not related to user authentication?()A SecurityB AuditC ApplicationD System

题目
单选题
Which of the following logs contains information on overall performance and events not related to user authentication?()
A

Security

B

Audit

C

Application

D

System


相似考题
更多“单选题Which of the following logs contains information on overall performance and events not related to user authentication?()A SecurityB AuditC ApplicationD System”相关问题
  • 第1题:

    To make audit information more productive, the DBA executes the following command before startingan audit operation:  SQL> ALTER SYSTEM SET AUDIT_TRAIL=DB,EXTENDED SCOPE=SPFILE;  Which statement is true regarding the audit record generated when auditing starts after restarting thedatabase()

    • A、It contains only the plan for the SQL statement executed by the user.
    • B、It contains the SQL text executed by the user and the bind variables used with it.
    • C、It contains the plan and statistics associated with the SQL statement executed by the user.
    • D、It contains the plan for the SQL statement executed by the user and the bind variables used with it.

    正确答案:B

  • 第2题:

    Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()

    • A、Administrator
    • B、User
    • C、Guest
    • D、Power user

    正确答案:B

  • 第3题:

    A server is having problems booting into the operating system.  Which of the following can provide important information to begin to trouble shoot the cause?()

    • A、 System logs
    • B、 Firmware updates
    • C、 POST messages
    • D、 Application logs

    正确答案:C

  • 第4题:

    Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()

    • A、Software problems don't generate errors. 
    • B、The user is more knowledgeable about software. 
    • C、The system logs will provide useful information alone. 
    • D、Key information pertaining to the software may be uncovered.

    正确答案:D

  • 第5题:

    Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()

    • A、Power Users.
    • B、Administrators.
    • C、Performance Log Users.
    • D、Performance Monitor Users.

    正确答案:C

  • 第6题:

    单选题
    A System p adminstrator must recover user information from a system that will not successfully boot. Which of the following install methods will accomplish this ()
    A

    Preservation

    B

    Migration

    C

    New and complete overwrite

    D

    Repair


    正确答案: A
    解析: 暂无解析

  • 第7题:

    单选题
    You have a computer that runs Windows 7. You need to identify which applications were installed during thelast week.  What should you do?()
    A

    From Reliability Monitor, review the informational events.

    B

    From System Information, review the Software Environment.

    C

    From Performance Monitor, review the System Diagnostics Report.

    D

    From Performance Monitor, run the System Performance Data Collector Set.


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()
    A

    Power Users.

    B

    Administrators.

    C

    Performance Log Users.

    D

    Performance Monitor Users.


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    A server is having problems booting into the operating system. Which of the following can provide important information to begin to troubleshoot the cause?()
    A

    System logs

    B

    Firmware updates

    C

    POST messages

    D

    Application logs


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    Using the following information: Performance data from an existing system that a new system will replace; Performance estimates that anticipate future workloads; Micro-partitioning and logical partitioning implementations.  Which of the following allows a technical sales representative to create a system design which can be imported into an HMC?()
    A

    IBM eConfig

    B

    IBM Performance Monitor

    C

    IBM Workload Estimator (WLE)

    D

    IBM System Planning Tool (SPT)


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    To make audit information more productive, the DBA executes the following command before startingan audit operation:  SQL> ALTER SYSTEM SET AUDIT_TRAIL=DB,EXTENDED SCOPE=SPFILE;  Which statement is true regarding the audit record generated when auditing starts after restarting thedatabase()
    A

    It contains only the plan for the SQL statement executed by the user.

    B

    It contains the SQL text executed by the user and the bind variables used with it.

    C

    It contains the plan and statistics associated with the SQL statement executed by the user.

    D

    It contains the plan for the SQL statement executed by the user and the bind variables used with it.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    A server is having problems booting into the operating system.  Which of the following can provide important information to begin to trouble shoot the cause?()
    A

     System logs

    B

     Firmware updates

    C

     POST messages

    D

     Application logs


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which of the following protocols can be used to retrieve system and network performance information from a router?()

    • A、LDAP
    • B、IMAP
    • C、TFTP
    • D、SNMP

    正确答案:D

  • 第14题:

    Which of the following logs contains information on overall performance and events not related to user authentication?()

    • A、Security
    • B、Audit
    • C、Application
    • D、System

    正确答案:D

  • 第15题:

    A System p adminstrator must recover user information from a system that will not successfully boot. Which of the following install methods will accomplish this ()

    • A、Preservation
    • B、Migration
    • C、New and complete overwrite
    • D、Repair

    正确答案:A

  • 第16题:

    Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()

    • A、Events log
    • B、System log
    • C、User Access log
    • D、Admin Access log

    正确答案:A

  • 第17题:

    You have a computer that runs Windows 7. You need to identify which applications were installed during thelast week.  What should you do?()

    • A、From Reliability Monitor, review the informational events.
    • B、From System Information, review the Software Environment.
    • C、From Performance Monitor, review the System Diagnostics Report.
    • D、From Performance Monitor, run the System Performance Data Collector Set.

    正确答案:A

  • 第18题:

    单选题
    Which of the following protocols can be used to retrieve system and network performance information from a router?()
    A

    LDAP

    B

    IMAP

    C

    TFTP

    D

    SNMP


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The company has a main office in San Francisco and branch offices in Paris and Bogota. Each branch office contains a Windows Server 2003 domain controller. All client computers run Windows XP Professional.   Users in the Bogota office report intermittent problems authenticating to the domain. You suspect that a specific client computer is causing the problem.   You need to capture the authentication event details on the domain controller in the Bogota office so that you can find out the IP address of the client computer that is the source of the problem.   What should you do?  ()
    A

     Configure System Monitor to monitor the authentication events.

    B

     Configure Performance Logs and Alerts with a counter log to record the authentication events.

    C

     Configure Network Monitor to record the authentication events.

    D

     Configure Performance Logs and Alerts with an alert to trigger on authentication events.


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following methods of user authentication is the MOST secure?()
    A

    CHAP

    B

    Kerberos

    C

    TACACS

    D

    EAP


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()
    A

    Software problems don't generate errors. 

    B

    The user is more knowledgeable about software. 

    C

    The system logs will provide useful information alone. 

    D

    Key information pertaining to the software may be uncovered.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    To make audit information more productive, the DBA executes the following command before starting an auditoperation: SQL> ALTER SYSTEM SET AUDIT_TRAIL=DB,EXTENDED SCOPE=SPFILE; Which statement is true regarding the audit record generated when auditing starts after restarting Thedatabase()
    A

    It contains only the plan for the SQL statement executed by the user.

    B

    It contains the SQL text executed by the user and the bind variables used with it.

    C

    It contains the plan and statistics associated with the SQL statement executed by the user.

    D

    It contains the plan for the SQL statement executed by the user and the bind variables used with it


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()
    A

    Administrator

    B

    User

    C

    Guest

    D

    Power user


    正确答案: A
    解析: 暂无解析