Which three of the zone’s properties can differ from the global zone?
For security reasons, one of the services your department provides has
to be run in a separate zone. Which three of the zone’s properties can differ from the global zone? (Choose three.)
Which two statements regarding patching are correct?
Which two statements regarding patching are correct? (Choose two.)
Whichstandard Solaris command can be used to calculate the MD5checksum for the /usr/bin/ls file?
You suspect that the /usr/bin/ls
binary on a system might have been replaced with a "Trojan
horse." You have been able to determine that the correct
MD5 checksum for the real /usr/bin/ls binary is: md5
(/usr/bin/ls) = b526348afd2d57610dd3635e46602d2a Which
standard Solaris command can be used to calculate the MD5
checksum for the /usr/bin/ls file?
Which two describe the remaining privilege sets?
The kernel calculates the effective set of privileges based on three
other privilege sets. This calculation begins with the set of privileges inherited from the parent process. The effective set is then further constrained by two other sets of privileges. Which two describe the remaining privilege sets? (Choose two.)
Which metacluster is best suited for initial installation of a strict minimized system?
Your company has acquired a small company and your task is to set up the first Solaris server in their network. As there is no existing JumpStart environment, you will have to start from scratch. Which metacluster is best suited for initial installation of a strict minimized system?
Which naming service does NOT support password expiration?
Which naming service does NOT support password expiration?
Which three utilities determine what privileges are used by a program or service?
Before a security administrator modifies the default privilege list
used for a SMF start or stop method, it is important to first determine which privileges are actually needed by that service. Which three utilities determine what privileges are used by a program or service? (Choose three.)
Which command is used to generate the IKE public/private key pair?
The development group would like to secure their network with IPsec. The number of hosts changes frequently, and they do not want to maintain preshared keys manually. The solution is to use IPsec with IKE and public keys. Which command is used to generate the IKE public/private key pair?
Which is an efficient way to limit the software that can be run on this system?
A security administrator needs to configure a Solaris system to act as a firewall between your company’s corporate network and the Internet, using Solaris IP Filter software to control the traffic passing between these two networks. Which is an efficient way to limit the software that can be run on this system?
Which item in the list would be specifically required for a VPN compared to a mode without encryption?
Which item in the list would be specifically required for a VPN compared to a mode without encryption?