PrepAway - Latest Free Exam Questions & Answers

What is the impact on the system?

Refer to the Exhibit.

As the result of a weak security configuration, an attacker is able to gain local access to a system. Next, the attacker gains administrative access by exploiting a local buffer overflow in the ufsrestore(1M) program because it had not been properly patched. Continuing, the attacker executes the commands found in the exhibit.

What is the impact on the system?

PrepAway - Latest Free Exam Questions & Answers

A.
There is no impact on the system because this command is no longer used in the Solaris 9 OE. This setting is ignored and a message to that effect is sent to the syslog facility.

B.
The system’s configuration is automatically tuned for enhanced security. This is done to protect the attacker’s prize by preventing the system from being exploited by other attackers.

C.
The system does not boot until a boot-time password is entered. This is a form of denial of service because the security administrator does not know the password and will therefore not be able to boot the system.

D.
The system panics because this parameter must only be set at run level 1. Because this command makes a change to the system’s programmable read-only memory (PROM) chip, changes must only be made to a system running in single user mode.


Leave a Reply