Which statement is true about the crypt(1) command?
Which statement is true about the crypt(1) command?
who has access to the role snooper that in turn has access to the profile Network Manager?
How would you set up a user called dhoch who has access to the role snooper that in turn has access to the profile Network Manager?
Which command is used to print all world-writable files?
Which command is used to print all world-writable files?
Why is this a bad decision?
While looking for dormant accounts, you notice that lastlog has become very large. Because space is tight on your /var partition, you decide to add this file to the list of files that is rotated by logadm. Why is this a bad decision?
Which three naming services support password expiration?
Which three naming services support password expiration? (Choose three.)
What do Protection Profiles describe?
What do Protection Profiles describe?
Which three topics must be described in an IT security policy?
Which three topics must be described in an IT security policy? (Choose three.)
Which activity is considered a network security control?
Which activity is considered a network security control?
Which two terms are associated with security threats?
Which two terms are associated with security threats? (Choose two.)
What problem can occur when sending intrusion detection information over a network?
What problem can occur when sending intrusion detection information over a network?