Information Technology Reference
In-Depth Information
Answer B is correct. ALERT , HOSTNAME , and SYSLOG are not valid keywords.
Question 4
Which of the following are source facilities for syslog messages? [Select all that
apply.]
A.
login
B.
news
C.
local8
D.
kern
Answers B and D are correct. auth (not login ) is the source facility associat-
ed with logging onto the system; therefore, answer A is incorrect. The eight
locally defined source facilities are local0 through local7 ; therefore, answer
C is incorrect.
Question 5
Which of the following are valid command-line arguments for the logger com-
mand? [Select all that apply.]
A.
-p (Specifies a priority)
B.
-l (Sends the message to the loghost system instead)
C.
-t (Specifies a tag that is included with the message)
D.
-L (Specifies the log file that should be used)
The correct answers are A and C. Answers B and D do not exist; how mes-
sages are processed is controlled by the entries of the /etc/syslog.conf file,
not by the command-line arguments of the logger command.
Question 6
Which of the following are valid uses for the asterisk ( * ) in the /etc/syslog.conf
file?
A.
Represents all source facilities
B.
Represents all severity levels
C.
Represents all messages
D.
Writes a message to all logged-on users
Search WWH ::




Custom Search