Which two activities are components of a risk management process?
Which two activities are components of a risk management process? (Choose two.)
What is the primary objective of the Controlled Access Protection Profile?
What is the primary objective of the Controlled Access Protection Profile?
What is the primary reason that systems are unsecure?
What is the primary reason that systems are unsecure?
An attacker wants to gain information using technical engineering methods. The attacker can _____. (Choose two
An attacker wants to gain information using technical engineering methods. The attacker can _____. (Choose two.)
Which three must a security administrator first identify and clearly understand before securing a new server?
Which three must a security administrator first identify and clearly understand before securing a new server? (Choose three.)
What action do you take?
You want to prevent service foo from starting at boot time. What action do you take?
When should the network interfaces be connected?
While building a web server, a security administrator performs these steps:
1. installs the Solaris Operating Environment from CD-ROM
2. installs the Solaris Security Toolkit on the server
3. executes the Solaris Security Toolkit to perform hardening of the server
4. reboots the server
When should the network interfaces be connected?
which file does this line belong?
Given:
fd0;fd;reserved;reserved;solaris.device.allocate;/etc/security/lib/fd_clean
To which file does this line belong?
Which entry in the syslog.conf file causes all alert messages to be mailed tothe user root?
Which entry in the syslog.conf file causes all alert messages to be mailed to
the user root?
What are two problems with using lax or loose permissions?
What are two problems with using lax or loose permissions? (Choose two.)