What has the highest priority when choosing safeguards?
What has the highest priority when choosing safeguards?
How can this functionality be enabled?
By default, sshd is not configured to tunnel X11 connections. How can this functionality be enabled?
How should Solaris Secure Shell be configured and used to accomplish this task?
Solaris Secure Shell can be used to tunnel unencrypted network traffic between two systems. This process is known as port forwarding. Suppose that an administrator needs to securely forward a telnet connection from a client called "qcc" using local port 5003 to a server called "qcs". How should Solaris Secure Shell be configured and used to accomplish this task?
What two configuration changes do you need to make?
You want to display a legal banner to users connecting to your system from outside the local network using telnet. This banner should be displayed before the user enters any account information. Your legal text is in /etc/default/banners/. What two configuration changes do you need to make? (Choose two.)
What should you do to enable the Solaris Secure Shell in the Solaris 9 OE?
What should you do to enable the Solaris Secure Shell in the Solaris 9 OE?
what is the correct set of private keys?
To prevent man-in-the-middle attacks and provide strong user authentication, the security administrator configures the server using RSA authentication and the client using user RSA authentication. Assuming that the Solaris Secure Shell is configured to use version 2 of the Secure Shell protocol, what is the correct set of private keys?
When you receive signed email and the digital signature is validated by your mail application, you can be assu
When you receive signed email and the digital signature is validated by your mail application, you can be assured _____.
Which is the correct configuration in the /etc/hosts.allow file?
You need to configure TCP Wrappers to allow access to all wrapped services to the private local area network (LAN). The LAN is on a class C network with a network
address of 192.168.1.0. Which is the correct configuration in the /etc/hosts.allow file?
Why is this possible?
A site security policy dictates that the root account is never permitted to remotely log in to a system. A root shell should only be obtained through the use of the su(1) command.
The security administrator sets the CONSOLE parameter in the /etc/default/login file. The administrator then attempts to remotely access the system using the Solaris Secure Shell as the root account and surprisingly is able to log in. Why is this possible?
Which RBAC database associates users and roles with authorizations and rights?
Which RBAC database associates users and roles with authorizations and rights?