Information Technology Reference
In-Depth Information
Question 53
Which of the following describe uses of the
/etc/security/policy.conf
file?
[Select all that apply.]
❑
A.
Specifies profiles that are granted to all users
❑
B.
Specifies privileged operations that are granted to all users
❑
C.
Specifies authorizations and profiles that are granted to root
❑
D.
Specifies authorizations that are granted to all users
Question 54
Identify the file used to store the global core file configuration.
Question 55
What does
dumpadm -n
do?
❍
A.
Enables the
savecore
procedure.
❍
B.
Resets the crash dump configuration to its default.
❍
C.
Resets the
savecore
numbers sequence to start at zero.
❍
D.
Disables the
savecore
procedures.
Question 56
Identify the
share
command-line argument used to enable NFS logging.
Question 57
Which of the following is the NFS Logging Daemon configuration file?
❍
A.
/etc/nfs/nfslog.conf
❍
B.
/etc/default/nfslogd
❍
C.
/etc/nfs/nfslogd
❍
D.
/etc/default/nfslog.conf