What is the impact of this change for their applications?
A company has produced several inhouse applications that have to deal
with authentication using passwords. The Solaris systems have been reconfigured to use the password history checking option. What is the impact of this change for their applications?
Which is the correct place to set a new system-wide default?
A large financial company has run through their annual external security audits. One section of the audit report handles password security. The auditors request to change the system to allow account locking after three failed logins. They found that the account locking feature was already enabled, but the accounts are locked after five failed login attempts. There is a system default for the number of failed login attempts before the account is locked. Which is the correct place to set a new system-wide default?
Which two sources of keying material are available for use with IPsec?
Which two sources of keying material are available for use with IPsec? (Choose two.)
Which technology will solve their problem?
Two administrators are trying to figure out how to implement encryption within a small network consisting of five machines. The requirement is to keep all the traffic between the nodes within that network private. They could not agree on a solution, because they are not sure what options are available. Which technology will solve their problem?
Which two algoritms can the administrator choose?
Company policy dictates that offsite backups need to be encrypted with 256-bit keys. The infrastructure is in place, so all the administrator must do is select which algorithm to use for this operation. Which two algoritms can the administrator choose? (Choose two.)
which file on the installation DVD can the adminstratior find the packagesassociated with each metacluster?
The security administrator has been tasked to design a
minimally installed centralized logging server. The administrator needs to examine
the packages included in the Solaris installation clusters to determine which
metacluster will be the best starting installation for the planned configuration. In
which file on the installation DVD can the adminstratior find the packages
associated with each metacluster?
Which statement describes a Security Policy?
After a recent security breach, you have been asked to create a Security Policy for your company. Which statement describes a Security Policy?
What would best meet the needs of the security administrator?
A security administrator has a requirement to identify that changes have been made to files under a specific set of directories. This requirement indicates that the control should check for changes to file ownership, permissions, and content. What would best meet the needs of the security administrator?
How would the administrator correct this problem?
The security administrator is reviewing a Solaris Security Toolkit audit run against the global zone of a server. The administrator discovers that the Basic Audit and Report Tool (BART) reports failures related to file changes in non-global zones. How would the administrator correct this problem?
when an attacker has removed audit records?
How would you configure auditing to identify when an attacker has removed audit records?