which command results in the execution of a device clean script?
When BSM is enabled, which command results in the execution of a device clean script?
which log file should the security administrator check?
To detect if user sam has assumed the identity of user bob on a system, which log file should the security administrator check?
Which file is unused in device allocation?
Which file is unused in device allocation?
Which command is used to configure BSM to track all arguments to an executed command?
Which command is used to configure BSM to track all arguments to an executed command?
Which type of user interactions will Solaris process accounting report?
Which type of user interactions will Solaris process accounting report?
What is an operational limitation of this server?
The company security policy requires all application servers to be hardened and minimized. A hardened and minimized application server is built and tested in a test network. The application server is deployed in a production network. What is an operational limitation of this server?
Which IPSec mechanism provides confidentiality for network traffic?
Which IPSec mechanism provides confidentiality for network traffic?
What is the functional purpose of the Solaris Security Toolkit?
What is the functional purpose of the Solaris Security Toolkit?
How is it possible to control processes dispatched by init?
How is it possible to control processes dispatched by init?
How should this file system be mounted most defensively in /etc/vfstab?
A file system stores static application data only. How should this file system be mounted most defensively in /etc/vfstab?