When does this change affect each user?
A security audit of a system’s security configuration resulted in a security administrator enabling password aging for all of the local system accounts. The security administrator set the MAXWEEKS parameter to 8 in /etc/default/passwd. When does this change affect each user?
Which historical least privilege facility does RBAC replace?
Which historical least privilege facility does RBAC replace?
What are two capabilities of RBAC?
What are two capabilities of RBAC? (Choose two.)
what command should be used to find these objects so that they can be cataloged and remediated?
There are many files and directories that are world-writable in the default configuration of the Solaris OE. As a result, it is possible for a user to either maliciously or accidentally exhaust file system resources. If necessary, what command should be used to find these objects so that they can be cataloged and remediated?
Which two commands can be used to effectively starve a system of its resources?
Which two commands can be used to effectively starve a system of its resources? (Choose two.)
What is the cause of the problem?
A security administrator is asked to investigate a potential compromise of a Solaris 9 server. One of the signs of intrusion is that the listing of all files that should be owned by root are apparently owned by the nsa user. What is the cause of the problem?
Which is a possible security concern with this configuration?
During a security assessment of a Solaris OE system, the examiner finds the run-control script, /etc/rc3.d/S20myapp. After verifying the need for this script with the system’s custodian, the examiner notices that the script starts a program in /opt/myapp/bin. Which is a possible security concern with this configuration?
Which two commands are used to detect a memory denial of service (DoS)?
Which two commands are used to detect a memory denial of service (DoS)? (Choose two.)
Which log files should be trusted to track an intrusion after a remote attacker with root privileges compromis
Which log files should be trusted to track an intrusion after a remote attacker with root privileges compromises a system on a local area network (LAN)?
Which three keywords are used to configure the /etc/security/audit_control file?
Which three keywords are used to configure the /etc/security/audit_control file? (Choose three.)