Information Technology Reference
In-Depth Information
Answer B is correct.
ALERT
,
HOSTNAME
, and
SYSLOG
are not valid keywords.
Question 4
Which of the following are source facilities for syslog messages? [Select all that
apply.]
❑
A.
login
❑
B.
news
❑
C.
local8
❑
D.
kern
Answers B and D are correct.
auth
(not
login
) is the source facility associat-
ed with logging onto the system; therefore, answer A is incorrect. The eight
locally defined source facilities are
local0
through
local7
; therefore, answer
C is incorrect.
Question 5
Which of the following are valid command-line arguments for the
logger
com-
mand? [Select all that apply.]
❑
A.
-p
(Specifies a priority)
❑
B.
-l
(Sends the message to the
loghost
system instead)
❑
C.
-t
(Specifies a tag that is included with the message)
❑
D.
-L
(Specifies the log file that should be used)
The correct answers are A and C. Answers B and D do not exist; how mes-
sages are processed is controlled by the entries of the
/etc/syslog.conf
file,
not by the command-line arguments of the
logger
command.
Question 6
Which of the following are valid uses for the asterisk (
*
) in the
/etc/syslog.conf
file?
❑
A.
Represents all source facilities
❑
B.
Represents all severity levels
❑
C.
Represents all messages
❑
D.
Writes a message to all logged-on users