Which two steps have to be performed to configure systems so that they are more resilient to attack?
Which two steps have to be performed to configure systems so that they are more resilient to attack? (Choose two.)
Is the root user also affected by the account locking?
A system is configured to automatically lock accounts after a number of failed login attempts. This was done by enabling the feature globally (LOCK_AFTER_RETRIES=YES) without any further changes. Is the root user also affected by the account locking?
Whichcommand line will the security administrator use to verify the zone namedyennov?
As part of the normal deployment process, a
security administrator is required to verify the security configuration of a
new Solaris 10 zone before it can be put into production. Using the Solaris
Security Toolkit, the security administrator will verify the zone’s
configuration against the corporate baseline, baseline.driver. Which
command line will the security administrator use to verify the zone named
yennov?
What is wrong with this approach?
A security administrator has a requirement to enable password aging on a server. After configuring the maximum age for a user’s password, the security administrator forces all of the users to change their passwords at next login. The administrator also configures password history to prevent users from simply reusing their last two passwords. What is wrong with this approach?
Which course of action should the administrator take?
The system administrator is required by the security policy to restrict the ability of users to view other processes on the system. This needs to be done for all users on the system. Which course of action should the administrator take?
which Solaris 10 subsystem is Process Rights Management implemented?
In which Solaris 10 subsystem is Process Rights Management implemented?
What is the result of this command?
Given: $ ppriv -s I-proc_exec $$ What is the result of this command?
What command should you use?
User saturn runs a program that consumes all of the system’s memory while continuously spawning a new program. You decide to terminate all of saturn’s programs to put a stop to this. What command should you use?
Which Solaris subsystem can you consider extending?
To comply with new security guidelines, your company requires you to implement a new password policy that performs stricter checks on new passwords than those performed by Solaris. Which Solaris subsystem can you consider extending?
Which command should the user admin execute to create the /log directory on the root file system?
Due to a new application requirement, on a Solaris 10 system, the ordinary user admin has to create directories on the root file system. The superuser has given a rights profile to the admin user as shown below: # grep admin /etc/user_attr admin::::type=normal;profiles=File System Management Which command should the user admin execute to create the /log directory on the root file system?