Which is a security concern when using IPsec encrypted tunnels?
Which is a security concern when using IPsec encrypted tunnels?
What must you do, after auditing has been enabled, to be able to distinguish between the audit events from dif
You are administering a consolidated system with many zones, and have been asked to enable auditing. What must you do, after auditing has been enabled, to be able to distinguish between the audit events from different zones in the global zone’s audit trail?
Which two methods or programs can be used to find out whether that happened?
A system administrator suspects that /etc/passwd or /etc/shadow has been modified without proper authorization. Which two methods or programs can be used to find out whether that happened? (Choose two.)
What is the minimum requirement to be able to use Solaris zones?
What is the minimum requirement to be able to use Solaris zones?
What is the cause?
The Solaris 10 cryptographic framework provides a set of end user commands. One of these new commands allows the encryption and decryption of a file. In encryption, a file named clear_file with this utility gives this error: # encrypt -a 3des -k 3_des.key -i clear_file -o encrypt_file encrypt: failed to generate a key: CKR_ATTRIBUTE_VALUE_INVALID What is the cause?
Which three Solaris services can be protected with Kerberos in Solaris 10?
Which three Solaris services can be protected with Kerberos in Solaris 10? (Choose three.)
what this protocol is responsible for implementing?
The Internet Key Exchange (IKE) protocol is defined in RFC 2409. What describes what this protocol is responsible for implementing?
what file is the size of the password history configured?
One of the operators of the mainframe group was moved to the UNIX group and tasked to activate and configure password history. For every user, the last 10 passwords should be remembered in the history. In what file is the size of the password history configured?
which packages are installed?
An administrator is required to minimize an installed Solaris system. Which command is used to query which packages are installed?
Which statement describes the system installation?
An adminstrator has designed a system as an Internet proxy server. This system has been installed with packages that support the proxy software and secure administration. All other packages have been removed from the system. Which statement describes the system installation?