Application log
File Replication log
System log
Security log
第1题:
A.System log
B.Security log
C.Audit log
D.Application log
第2题:
A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()
第3题:
In which file can the administrator view the detailed results of the overnight cluster automatic verification?()
第4题:
What is the default local location for syslog and trace files?()
第5题:
A user states that their web browser was recently updated and continuously crashes. Which of the following could the technician use to gather more information about the issue?()
第6题:
A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()
第7题:
A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()
第8题:
Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()
第9题:
You received the following error: ORA-01578: ORACLE data block corrupted (file # %s, block # %s) Which file will you check to view additional information regarding the cause of this error?()
第10题:
system /v
winnt /s
sfc /scannow
chkdsk /f
第11题:
Events log
System log
User Access log
Admin Access log
第12题:
the alert log file and the trace files
the redo log files
the control file
the change tracking file
第13题:
下面那个log文件是属于PONNBI北向系统的
第14题:
A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()
第15题:
A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()
第16题:
APG的事件查看器(EVENTVIEWER)可以查看下述哪些事件?()
第17题:
A technician installed a new application on a Windows XP desktop. When the technician tries to launch the application it crashes. Which of the following can the technician use to troubleshoot the application?()
第18题:
A technician is troubleshooting a user’s problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?()
第19题:
An administrator receives an error when attempting to execute a WebSphere Commerce command and decides to take the following steps to troubleshoot the problem: Check to see if the request was processed by the WebSphere plug-in but was never received by the WebSphere Application Server Check for Java errors from EJBs and servlets Trace WebSphere Commerce Server subsystems and commands Which of the following files should the administrator check to accomplish these steps?()
第20题:
You are working on the Certkiller database. What is the default name of the alert log file in this database?()
第21题:
Set the group’s folder permissions to deny.
Use Event Viewer to monitor changes to the file.
Store a backup copy of the file on a USB drive.
Change the file attribute to read only.
第22题:
Verify full system functionality.
Document the findings, actions, and outcomes.
Establish a plan of action to resolve the problem.
Question the user and identify changes the user has made to the system.
第23题:
/log
/home/log
/var/log
/etc/log