What is the safest setting for the Protocol variable in the /etc/ssh/sshd_config file?
What is the safest setting for the Protocol variable in the /etc/ssh/sshd_config file?
Which settings should you check?
You want to enable TCP port-forwarding for ssh. Which settings should you check?
Which identifies a message digest algorithm?
Which identifies a message digest algorithm?
What is the correct way to add this user account?
The security administrator needs to create an account bob for a temporary employee. The employee will only perform simple document editing, so must not be allowed to modify the login environment. What is the correct way to add this user account?
When should a security administrator consult the Solaris Fingerprint Database?
When should a security administrator consult the Solaris Fingerprint Database?
Which OBP commands can the security administrator execute to prevent OpenBoot PROM parameters from unauthorize
The security administrator maintains a number of servers in a facility shared by other organizations. Which OBP commands can the security administrator execute to prevent OpenBoot PROM parameters from unauthorized modification?
Which is part of a time of check, time of use (TOCTOU) attack?
Which is part of a time of check, time of use (TOCTOU) attack?
Which option is used in /etc/vfstab to limit the size of a tmpfs(7FS) file system to 512MB to prevent a memory
Which option is used in /etc/vfstab to limit the size of a tmpfs(7FS) file system to 512MB to prevent a memory denial of service (DoS)?
What is the name of the tool used to change the minfree threshold?
To prevent regular users from filling up a file system partition, you can specify a minfree option to newfs. If you forget to specify this option when the file system is created, the file system characteristics can be changed at a later time.
What is the name of the tool used to change the minfree threshold?
What is the impact on the system?
Refer to the Exhibit.
As the result of a weak security configuration, an attacker is able to gain local access to a system. Next, the attacker gains administrative access by exploiting a local buffer overflow in the ufsrestore(1M) program because it had not been properly patched. Continuing, the attacker executes the commands found in the exhibit.
What is the impact on the system?