Which is the correct entry in audit_user(4)?
A system administrator sets up a global BSM policy that audits all user events except file access. Which is the correct entry in audit_user(4)?
Which files, apart from the device node itself, should you edit to make sure that this new device is maintaine
You add a new removable device to a workstation which has BSM enabled.
Which files, apart from the device node itself, should you edit to make sure that this new device is maintained by the device allocation management? (Name one, specifying the full path name and using lower case characters.)
How should you configure BSM to help you detect whether an attacker has removed audit records?
How should you configure BSM to help you detect whether an attacker has removed audit records?
When will a removable diskette be deallocated?
When will a removable diskette be deallocated?
Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
Which command can customize the size for system log file rotation?
Which command can customize the size for system log file rotation?
Which statement about denial of service attack is FALSE?
Which statement about denial of service attack is FALSE?
Which evasion technique can NOT be detected by system integrity checks?
Which evasion technique can NOT be detected by system integrity checks?
What command should you use?
User fred runs a program that consumes all of the system’s memory while continuously spawning a new program. You decide to terminate all of fred’s programs to put a stop to this. What command should you use?
How do you distinguish between denial of service attacks and programming errors?
How do you distinguish between denial of service attacks and programming errors?