What is the most secure configuration for protecting JumpStart servers in a data center?
Network segmentation is a highly recommended mechanism to protect your JumpStart environment. What is the most secure configuration for protecting JumpStart servers in a data center?
Which command can be used to create per-process core files in /var/core?
The Solaris 9 OE is configured, by default, to create core files for all non-set-ID processes. These files are created in the working directory of the process. These files can, however, be created in an administrator-defined location. This is often done to restrict access to these files to prevent unauthorized disclosure of information. Which command can be used to create per-process core files in /var/core?
What should you do?
You are asked to manually verify a Solaris Security Toolkit configuration.
What should you do?
Which three methods are features of the Solaris Security Toolkit for management of the output generated during
Which three methods are features of the Solaris Security Toolkit for management of the output generated during a run? (Choose three.)
Where do you look for the best information on securely configuring domains and system controllers?
You are asked to harden a SunFire 15K server. Where do you look for the best information on securely configuring domains and system controllers?
Who can write to this file system?
Given that the entry below is listed in the /etc/dfs/dfstab file:
share -F nfs -o rw=foo,root=foo,ro /export
Who can write to this file system?
What information is provided?
Given:
$ showmount -e
What information is provided?
What information is collected by process accounting?
What information is collected by process accounting? (Choose two.)
which file does the Solaris 9 OE accounting facility log commands?
To which file does the Solaris 9 OE accounting facility log commands?
Which two statements are true?
A security administrator is reviewing the BSM configuration on a system.
While looking at the /etc/security/audit_control file, the administrator finds that the system is configured to audit the fa audit class. Which two statements are true? (Choose two.)