PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

How should Solaris Secure Shell be configured and used to accomplish this task?

Solaris Secure Shell can be used to tunnel unencrypted network traffic between two systems. This process is known as port forwarding. Suppose that an administrator needs to securely forward a telnet connection from a client called "qcc" using local port 5003 to a server called "qcs". How should Solaris Secure Shell be configured and used to accomplish this task?

Why is this possible?

A site security policy dictates that the root account is never permitted to remotely log in to a system. A root shell should only be obtained through the use of the su(1) command.

The security administrator sets the CONSOLE parameter in the /etc/default/login file. The administrator then attempts to remotely access the system using the Solaris Secure Shell as the root account and surprisingly is able to log in. Why is this possible?


Page 74 of 108« First...102030...7273747576...8090100...Last »