Which is the correct procedure to do the interactive text installation?
You have an x86-based system with a monitor, but want to install Solaris 10 OS in text mode. Which is the correct procedure to do the interactive text installation?
Which file must be edited to achieve this?
A recent system security review requires that in addition to the default logging of users using the su command, all su attempts must be logged to the console. Which file must be edited to achieve this?
Which two statements are true?
You are informed that an unprivileged user has executed commands as the superuser. You decide to look at the log file for the su(1) command. The contents in the log file are:
SU 12/07 11:50 + pts/6 gv1123-root
SU 12/07 11:54 – pts/5 fb12-root
SU 12/07 11:54 + pts/3 gv1123-root
SU 12/07 12:03 + pts/1 jjj-gv1123
You know the file has NOT been tampered with.
Which two statements are true? (Choose two.)
Which entry should you place in the appropriate file to achieve this?
You receive a request to set up trusting for user1 when user1 logs in to system1 from system2.
Which entry should you place in the appropriate file to achieve this?