I practiced a question like this, and I feel like sysmgr.log was mentioned as a potential option, but I can't recall if it actually logs executed SQL statements.
Okay, let's see. The options talk about protecting a process, protecting an ESM Server, protecting a Windows Server system, and making the Traps agent tamper-proof. I'm guessing "Service Protection" has to do with the Traps agent itself, so I'll lean towards option D.
This seems like a straightforward question about categorizing a given scenario. I'll carefully read the passage and options to determine the best answer.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Kenneth
5 months agoCordell
6 months agoRolland
6 months agoKerry
6 months agoAlayna
6 months agoJanna
6 months agoMarti
6 months agoWenona
6 months agoBrittney
6 months agoCarma
6 months agoJoseph
6 months ago