An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this() audit。 syslog。 TCB。 sysck。
某山区农民甲从人贩子手中买到妇女乙,欲与乙成亲。乙女不从,甲遂将乙关在自家柴房内数十日之久,但乙女仍不从,甲怒急,冲进柴房后将乙强奸。乙女就此绝食,声称如果甲再不将其送回自己父母手中,就要死在甲面前。甲见状恐闹出人命,于己不利,遂将乙女放回其家中。关于甲的行为下列说法正确的是()。 构成收买被拐卖的妇女罪。 构成非法拘禁罪。 构成强奸罪。 不构成犯罪。
A recently installed package needs to be rolled back to aprevious version. Which of the following commands will perform the task?() reject。 cleanup。 deinstall。 uninstall。
When rejecting applied an dependent updates on an AIX 5L system, which of the following procedures is most appropriate to follow?() Use the install PREVIEW option to view a list of all updates that will be rejected。 Use the lslpp -d command to view the dependent filesets that will be rejected。 Select the SMIT option to Verify Software Requisites and Installations first to generate a list of all applied updates.。 Select the SMIT option to List the Maintenance Level of a Software Product to double check the update level that should be removed。
When a user tries to log into the system, the following error occurs: "3004-004. You must "exec" login from the lowest login Shell". Which of the following procedures should be performed next to determine the cause of the problem?() Reboot the system. 。 Increase the number of ptys. 。 Increase number of licenses. 。 Run df -k to check for full filesystems.。
某经技术改造设备已使用6年,设计总使用年限为12年,经计算到评估基准日,其加权投资年限为4年,该设备的成新率最接近于()。