Information Technology Reference
In-Depth Information
Question 53
Which of the following describe uses of the /etc/security/policy.conf file?
[Select all that apply.]
A.
Specifies profiles that are granted to all users
B.
Specifies privileged operations that are granted to all users
C.
Specifies authorizations and profiles that are granted to root
D.
Specifies authorizations that are granted to all users
Question 54
Identify the file used to store the global core file configuration.
Question 55
What does dumpadm -n do?
A.
Enables the savecore procedure.
B.
Resets the crash dump configuration to its default.
C.
Resets the savecore numbers sequence to start at zero.
D.
Disables the savecore procedures.
Question 56
Identify the share command-line argument used to enable NFS logging.
Question 57
Which of the following is the NFS Logging Daemon configuration file?
A.
/etc/nfs/nfslog.conf
B.
/etc/default/nfslogd
C.
/etc/nfs/nfslogd
D.
/etc/default/nfslog.conf
Search WWH ::




Custom Search