Whichevent will NOT be reported by comparing the two manifests with BART?
The security administrator has created a Basic
Audit and Report Tool (BART) control manifest for the /etc directory. A test
manifest is created about one hour later, and the two manifests are
compared. The administrator checks all attributes for the files in /etc. Which
event will NOT be reported by comparing the two manifests with BART?
What is the reason for this?
After receiving the results from a recent security compliance evaluation, a security administrator was told to ensure that every user has to change their password regularly. After enabling password aging in the /etc/default/passwd file, the security administrator finds that existing local users are still not being forced to change their password. What is the reason for this?
Which command is used to configure auditing to track all arguments to anexecuted comand?
Which command is used to configure auditing to track all arguments to an
executed comand?
Which two should you do before starting to minimize the system?
After a recent audit, you have been requested to minimize an existing Solaris
system which runs a third party database application. Which two should you do before starting to minimize the system? (Choose two.)
Which are three reasons why you should NOT create accounts for them in the global zone and grant them the Zone
The company you work for is leasing zones to customers to run their applications in.
You want each customer to be able to run the zoneadm command to start their zone in case of accidental shutdown, and also zlogin so they can access the console of their zone. Which are three reasons why you should NOT create accounts for them in the global zone and grant them the Zone Management profile? (Choose three.)
Which two options will enhance their access control?
A small newspaper company has problems, because one of their servers
was modified by someone. Before this incident, they didn’t bother about security. After a new installation, they now want to restrict access to the system. Which two options will enhance their access control? (Choose two.)
What will this ssh command do?
A user started the ssh-agent followed by the ssh-add command.
Afterwards the user connects to a remote system by using the ssh command. What will this ssh command do?
Which parameter must be changed in /etc/default/login to enable this functionality?
A site security policy dictates that all failed logins to critical systems must be logged
and monitored. Which parameter must be changed in /etc/default/login to enable this functionality?
Why is this message being generated?
A user tries to log in to a system using ssh and receives this message: The authenticity of host ‘example-01 (1.2.3.4)’ can’t be established. RSA key fingerprint is 00:11:22:33:44:55:66:77:88:99:aa:bb:cc:dd:ee:ff. Are you sure you want to continue (yes/no)? Why is this message being generated?
Which command will allow the administrator to create digests and assure that the digests have NOT been tampere
A security administrator is asked to create digests of some important files on a server. The digests must be stored locally on the same server. Which command will allow the administrator to create digests and assure that the digests have NOT been tampered with?