单项选择题
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file.
Which of the following AIX component accomplishes this?()
A.audit
B.syslog
C.TCB
D.sysck
相关考题
-
单项选择题
In AIX Version 5.3, a system administrator wants to create a bootlist for normal bootups from a file named /bootlist.norm. Which of the following is the proper command to accomplish this?()
A.bootlist -m normal < /bootlist.norm
B.bootlist -m normal -f /bootlist.norm
C.bootlist -m normal -o /bootlist.norm
D.bootlist -m normal hdisk0 hdisk1 rmt0 fd /bootlist.norm -
单项选择题
An administrator is ordering a new Power 550. They will mirror rootvg and are concerned about single points of failure. Which of the following features should be ordered?()
A.Dual I/O planar, dual disk drives, dual SCSI adapters
B.Dual disk drive enclosures, dual disk drives, extra media bay
C.Dual disk drive enclosures, dual disk drives and dual SCSI adapters
D.Dual I/O planar, extra media bay, dual disk drives -
单项选择题
Following a system boot,the display indicates that previously detected hardware is missing. Which of the following commands would identify the missing hardware?()
A.diag
B.lscfg
C.cfgmgr
D.lsslot
