How does BSM relate to the Solaris Common Criteria certification?
How does BSM relate to the Solaris Common Criteria certification?
What security principle has been violated?
You notice that all mailboxes in /var/mail are world readable. Your company’s policy states that a user’s mailbox should be protected against access by other users. What security principle has been violated?
What kind of compromise renders the system untrusted?
What kind of compromise renders the system untrusted?
Which three are examples of network security mechanisms?
Which three are examples of network security mechanisms? (Choose three.)
Which three files are used for trusted remote host and user equivalence?
Which three files are used for trusted remote host and user equivalence? (Choose three.)
which statement is true?
Senior management has asked you to quantify the risks in your production Solaris Operating Environment. There are a number of ways you may attempt to measure the effectiveness of any of the safeguards you have implemented. When measuring residual risk, which statement is true?
Which type of attacker strikes the most often?
Which type of attacker strikes the most often?
What is a security concern when using IPSec encrypted tunnels?
What is a security concern when using IPSec encrypted tunnels?
which type of information will the command return to the attacker?
Given:
rpcinfo -p foo
If an attacker has penetrated a local area network (LAN), the attacker can use the rpcinfo command to gather intelligence about a system running RPC. When run against the host foo, which type of information will the command return to the attacker?
When must a host security assessment be completed?
A system administrator hardens an application server with the Solaris Security Toolkit using their pre-existing JumpStart environment. When must a host security assessment be completed?