An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()
A./var/adm/sulog B./etc/syslog.conf C./etc/security/sysck.cfg D./etc/security/syslog.conf
单项选择题An administrator has a server experiencing performance problems with logical volumes within a particular volume group. Which command can report I O statistics for logical partitions with each logicalvolume within the volume group()
A.Islv B.vmstat C.iostat D.Ivmstat
单项选择题WhichofthefollowingcommandscanbeusedtoprepareasystemtophysicallyinsertaPCIhotplugadapter()
A.mkdev B.cfmgr C.drslot D.lsslot
单项选择题A System p customer has installed components from the Linux ToolBox. By default, which of the following directories will contain the open source commands such as gzip, gunzip and zcat()
A./opt/freeware/bin B./usr/bin/freeware C./var/freeware/bin D./usr/sbin/freeware
单项选择题Duringwhichbootphaseistherootvgfirstactivated()
A.Phase 1 B.Phase 2 C.Phase 3 D.POST Phase
单项选择题Whatistheratioofphysicalpartitionstologicalpartitionsinrootvginanon-mirroredenvironment()
A.0 B.1 C.2 D.3