Which two statements are true about the key management mechanism for Solaris IPSec?
Which two statements are true about the key management mechanism for Solaris IPSec? (Choose two.)
Which two steps are performed as part of system hardening?
Which two steps are performed as part of system hardening? (Choose two.)
Which two threats should be defined in a Solaris threat model?
Which two threats should be defined in a Solaris threat model? (Choose two.)
How frequently should risk analysis for a Solaris installation be conducted?
How frequently should risk analysis for a Solaris installation be conducted?
What form of logging do you need?
A number of users is allowed to su(1M) to a role named groupadm. You want to track file system alterations made by this role and correlate the alterations to the actual user.
What form of logging do you need?
What type of attack is it?
A system user exploits a buffer overflow to become root. What type of attack is it?
What are three platform security mechanisms?
What are three platform security mechanisms? (Choose three.)
Which statement is true about Discretionary Access Control?
Which statement is true about Discretionary Access Control?
Which weakness diminishes a security administrator’s ability to detect an intrusion?
Which weakness diminishes a security administrator’s ability to detect an intrusion?
Who performs Common Criteria evaluations?
Who performs Common Criteria evaluations?