A system administrator at home wants secure communication with the company’s network through a VPN. Which step would accomplish this?
What type of condition does Basic Audit and Report Tool (BART) allow you to detect?
Solaris 10 includes the ability to lock a user’s account after a fixed number of failed login accounts. What is the disadvantage of enabling this feature?
During the installation of your database
server db, you disabled telnet access to it by running inetadm -d
telnet, because your company security policy prohibits unencrypted
access to the systems. You also added a default deny access policy:
# cat /etc/hosts.deny ALL: ALL Now a legacy application running
on the legacy server needs access to the db server, using telnet, and you have been asked to implement the changes. Which three steps do you have to take to enable telnet on db and restrict access to it, so that only traffic from legacy is allowed? (Choose three.)
A user that you are investigating is logged in on a system with auditing enabled. The user is running vi, and you need to log which files the user is accessing. Unfortunately, the fr class is not audited, so you want to explicitly alter the audit pre-selection mask for this vi process. Which command allows you to do that?
An NFSv4 client has a user jupiter from domain example.com. The NFS server is in the ficticious.com domain and knows the user as jupiter as well. How would the server treat requests made by the client?
An application file system stores unchanging data only. How should this file system be mounted defensively in /etc/vfstab?
Which two statements are true when applying the Solaris Security Toolkit software to a system with non-global zones installed? (Choose two.)
Which three items are the most relevant when trying to prevent resource exhaustion attacks? (Choose three.)
Given the command reported in /etc/dfs/dfstab from a system export: share -F nfs rw=foo,root=foo,ro /export Who can write to this file system?