An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this()
A.audit B.syslog C.TCB D.sysck
A user reports that they cannot cd to /tmp/application. A system administrator entered the following command: Is -Id /tmp/application drw-r-r- 4 root system 512 Jan 15 14:09 application Which of the following is the most likely cause of the problem()
A.The /tmp/application should be globally writable. B.The /tmp/application directory should be executable. C.The /tmp/application directory should be owned by the user. D.The /tmp/application directory should have the sticky bit set
An administrator performs a full backup every Saturday evening and daily incremental backups the rest of the week. The system failed on Thursday and must be restored. Which backup tapes will be required to restore the system to its most recent recoverable state()
A.Saturday’s full backup tape B.Wednesday’s backup tape C.Saturday’s full backup and Wednesday’s incremental backup tapes D.Saturday’s full backup and Sunday’s through Wednesday’s incremental backup tapes