which file does this line belong?
Given:
fd0;fd;reserved;reserved;solaris.device.allocate;/etc/security/lib/fd_clean
To which file does this line belong?
Which entry in the syslog.conf file causes all alert messages to be mailed tothe user root?
Which entry in the syslog.conf file causes all alert messages to be mailed to
the user root?
What are two problems with using lax or loose permissions?
What are two problems with using lax or loose permissions? (Choose two.)
When does this change affect each user?
A security audit of a system’s security configuration resulted in a security administrator enabling password aging for all of the local system accounts. The security administrator set the MAXWEEKS parameter to 8 in /etc/default/passwd. When does this change affect each user?
Which historical least privilege facility does RBAC replace?
Which historical least privilege facility does RBAC replace?
What are two capabilities of RBAC?
What are two capabilities of RBAC? (Choose two.)
what command should be used to find these objects so that they can be cataloged and remediated?
There are many files and directories that are world-writable in the default configuration of the Solaris OE. As a result, it is possible for a user to either maliciously or accidentally exhaust file system resources. If necessary, what command should be used to find these objects so that they can be cataloged and remediated?
Which two commands can be used to effectively starve a system of its resources?
Which two commands can be used to effectively starve a system of its resources? (Choose two.)
What is the cause of the problem?
A security administrator is asked to investigate a potential compromise of a Solaris 9 server. One of the signs of intrusion is that the listing of all files that should be owned by root are apparently owned by the nsa user. What is the cause of the problem?
Which is a possible security concern with this configuration?
During a security assessment of a Solaris OE system, the examiner finds the run-control script, /etc/rc3.d/S20myapp. After verifying the need for this script with the system’s custodian, the examiner notices that the script starts a program in /opt/myapp/bin. Which is a possible security concern with this configuration?