Which two commands list the profiles assigned to user fred?
Which two commands list the profiles assigned to user fred? (Choose two.)
What is the algorithm the Solaris system uses to determine the attributes of an executable?
Commands can be listed in multiple profiles with different attributes. Additionally, the system takes the default profiles into account. What is the algorithm the Solaris system uses to determine the attributes of an executable?
With what effective UID and real UID will the /usr/sbin/auditd program be started?
Given the command and output:
# profiles -l testrole
Audit Control:
/etc/init.d/audit euid=0, egid=3
/etc/security/bsmconv uid=0
/etc/security/bsmunconv uid=0
/usr/sbin/audit euid=0
/usr/sbin/auditconfig euid=0
/usr/sbin/auditd uid=0
All:
*
And given the fact that testrole executes commands with a profile shell. With what effective UID and real UID will the /usr/sbin/auditd program be started?
What effective uid and real uid will /usr/sbin/auditd start?
Given:
# profiles -l testrole
All:
*
Audit Control:
/etc/init.d/audit euid=0, egid=3
/etc/security/bsmconv uid=0
/etc/security/bsmunconv uid=0
/usr/sbin/audit euid=0
/usr/sbin/auditconfig euid=0
/usr/sbin/auditd uid=0
And, given the fact that testrole executes commands with a profile shell. What effective uid and real uid will /usr/sbin/auditd start?
Which RBAC command helps you find the attributes commands that are executed for a particular user?
Which RBAC command helps you find the attributes commands that are executed for a particular user?
What are two solutions for this problem?
The system administrator assigned a profile entry with sufficient rights to execute the snoop command. The user reports that it does NOT work. The system administrator wants the command to work automatically for the user. The system administrator verifies that the RBAC database entries are correct.
What are two solutions for this problem? (Choose two.)
Which entries are contained in the /etc/security/exec_attr file after the required RBAC configuration is imple
The security administrator wants to assign user bob to a netsec role so that the user can run the ifconfig and snoop commands with a rights profile named NSM. Which entries are contained in the /etc/security/exec_attr file after the required RBAC configuration is implemented?
When you add an account using roleadd, what is the default shell?
Your system is newly built and has a default set up. When you add an account using roleadd, what is the default shell?
How would you implement this using the RBAC framework?
The security administrator wishes to create a rights profile which is a superset of another rights profile. Certain commands in the new rights profile are to be run with different attributes to the original profile. How would you implement this using the RBAC framework?
What is the result?
You type the command:
# rolemod -A solaris.grant -P "Network Admin" operator What is the result?