I practiced a question like this, and I feel like sysmgr.log was mentioned as a potential option, but I can't recall if it actually logs executed SQL statements.
Okay, let's see. The options talk about protecting a process, protecting an ESM Server, protecting a Windows Server system, and making the Traps agent tamper-proof. I'm guessing "Service Protection" has to do with the Traps agent itself, so I'll lean towards option D.
This seems like a straightforward question about categorizing a given scenario. I'll carefully read the passage and options to determine the best answer.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Kenneth
4 months agoCordell
4 months agoRolland
4 months agoKerry
4 months agoAlayna
5 months agoJanna
5 months agoMarti
5 months agoWenona
5 months agoBrittney
5 months agoCarma
5 months agoJoseph
5 months ago