A.communications B.kernel C.security D.none
单项选择题Asystemadministratorwasaskedtologinformationonpossiblesecuritybreachesonaserver.Whichfileshouldadditionalentriesbeaddedtocapturethisinformation?()
A./var/adm/sulog B./etc/syslog.conf C./etc/security/sysck.cfg D./etc/security/login.cfg
单项选择题Asystemadministratorfoundaprocessontheserverthatshouldbestopped.Whatcommandcanbeusedtolistallthesignalactionsdefinedforthisprocess?()
A.ps B.pstat C.portmap D.procsig
单项选择题Whatdotheentriesinthe procdirectoryrepresent?()
A.They are the decimal numbers corresponding to the active process IDs. B.They are the decimal numbers corresponding to the gid of the system group. C.They are the decimal numbers corresponding to the block IDs of the boot sector. D.They are the decimal numbers corresponding to the inodes of the system directories.
单项选择题Because of system performance problems, a system administrator ran the iostat command. The following iostat output is provided: Which of the following issues can be derived from the output?()
A.The server is CPU bound. B.The server has network problems. C.The server is memory constrained. D.The server needs the disk usage to be optimized.X
单项选择题A system administrator ran the iostat command because of system performance problems. The following iostat output is provided: Based on the output, which of the following is insufficient?()
A.CPU B.Memory C.Paging space D.Disk capacityX