/var/adm/sulog
/etc/syslog.conf
/etc/security/sysck.cfg
/etc/security/syslog.conf
第1题:
AIX中下面哪个文件包含了对用户密码的设置信息()。
第2题:
Which of the following files should be edited to disable remote machines from performing a "finger" on a system?()
第3题:
Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()
第4题:
Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()
第5题:
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()
第6题:
An administrator notices the / filesystem is 98% full. Which of the following files commonly grow rapidly()
第7题:
AIX中下面哪个文件包含了UID、HOME目录及shell信息()。
第8题:
fwtmp < /etc/security/failedlogin
cat /etc/security/failedlogin
who
alog -f /etc/security/failedlogin -o
第9题:
/var/adm/sulog
/etc/syslog.conf
/etc/security/sysck.cfg
/etc/security/login.cfg
第10题:
chgrp
chuser
edit /etc/user
edit /etc/security/group
第11题:
/etc/security/user
/etc/services
/etc/inetd.conf
/etc/hosts.equiv
第12题:
/etc/security/user
/etc/security/passwd
/etc/security/mkuser.sys
/etc/security/mkuser.default
第13题:
A user wants to be permanently added to the dba group. Which of the following commands or processes can be used to accomplish this()
第14题:
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()
第15题:
An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()
第16题:
Which files are managed through the use of the file collection "HACMP_Files"?()
第17题:
The root id is set so that direct login is disabled. Information must be reviewed relating to when root access was obtained. In which of the following files is this information located?()
第18题:
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()
第19题:
/var/rmc/ctrmc.acls
/etc/ctrmc/rsct.acls
/etc/security/rsct.acls
/usr/sbin/rsct/cfg/ctrmc.acls
第20题:
The PowerHA Global ODM.
System networking files including /etc/hosts, /etc/inetd.conf and /etc/services
Security files including /etc/passwd, /etc/security/passwd, /etc/group and/etc/security/group
User configurable files including Application server start and stop scripts, custom pre and post notificationevents and application monitoring scripts
第21题:
/etc/security/limits
/etc/security/mkuser.sys
/etc/security/priv
/etc/security/user
第22题:
/var/adm/wtmp
/etc/security/failedlogin
/smit.script
/proc
第23题:
/var/adm/sulog
/var/adm/wtmp
/etc/security/user
/etc/security/failedlogin