An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()
A.audit B.syslog C.TCB D.sysck
In AIX Version 5.3, a system administrator wants to create a bootlist for normal bootups from a file named /bootlist.norm. Which of the following is the proper command to accomplish this?()
A.bootlist -m normal < /bootlist.norm B.bootlist -m normal -f /bootlist.norm C.bootlist -m normal -o /bootlist.norm D.bootlist -m normal hdisk0 hdisk1 rmt0 fd /bootlist.norm
An administrator is ordering a new Power 550. They will mirror rootvg and are concerned about single points of failure. Which of the following features should be ordered?()
A.Dual I/O planar, dual disk drives, dual SCSI adapters B.Dual disk drive enclosures, dual disk drives, extra media bay C.Dual disk drive enclosures, dual disk drives and dual SCSI adapters D.Dual I/O planar, extra media bay, dual disk drives