Which of the following commands will set the logging monitor to record security events with a priority at or above 3?
A) logging monitor 3
B) logging monitor 0-3
C) logging monitor 3-7
D) logging monitor debug 3
A
Explanation: A) The logging monitor command accepts text or numbers for the severity level of events, in this case 3 through 0 (higher priority events have a lower number), so the correct command for this is logging monitor 3.
You might also like to view...
Loops are frequently used to ____ data; that is, to make sure values fall within an acceptable or reasonable range.
A. validate B. enter C. add D. manipulate
Hashing to large files is generally easier than hashing to an address in an array.
Answer the following statement true (T) or false (F)
____ marks create a scale of measure for each value on the y-axis.
A. Datapoint B. Tick C. Axis D. Legend
To uncloak all files in a site, you should select the Files Panel options button, point to Site, point to Cloaking, then select ____.
A. All B. Site C. Uncloak All D. Uncloak Site