When should ssh host keys be replaced?
When should ssh host keys be replaced? (Choose two.)
Which port(s) should you open on the firewall?
You want to enable your users to use ssh to log in to your system, and to forward X11 connections from your server to their workstations. The server sits behind a firewall that refuses all incoming and outgoing connections. Which port(s) should you open on the firewall?
Which syslog facility is used by inetd when TCP Wrappers messages are generated?
TCP Wrappers functionality is integrated into the inetd service in the Solaris 9 OE. Which syslog facility is used by inetd when TCP Wrappers messages are generated?
What is the safest setting for the Protocol variable in the /etc/ssh/sshd_config file?
What is the safest setting for the Protocol variable in the /etc/ssh/sshd_config file?
Which settings should you check?
You want to enable TCP port-forwarding for ssh. Which settings should you check?
Which identifies a message digest algorithm?
Which identifies a message digest algorithm?
What is the correct way to add this user account?
The security administrator needs to create an account bob for a temporary employee. The employee will only perform simple document editing, so must not be allowed to modify the login environment. What is the correct way to add this user account?
When should a security administrator consult the Solaris Fingerprint Database?
When should a security administrator consult the Solaris Fingerprint Database?
Which OBP commands can the security administrator execute to prevent OpenBoot PROM parameters from unauthorize
The security administrator maintains a number of servers in a facility shared by other organizations. Which OBP commands can the security administrator execute to prevent OpenBoot PROM parameters from unauthorized modification?
Which is part of a time of check, time of use (TOCTOU) attack?
Which is part of a time of check, time of use (TOCTOU) attack?