Which command should the user admin execute to create the /log directory on the root file system?
Due to a new application requirement, on a Solaris 10 system, the ordinary user admin has to create directories on the root file system. The superuser has given a rights profile to the admin user as shown below: # grep admin /etc/user_attr admin::::type=normal;profiles=File System Management Which command should the user admin execute to create the /log directory on the root file system?
Which step would accomplish this?
A system administrator at home wants secure communication with the company’s network through a VPN. Which step would accomplish this?
What type of condition does Basic Audit and Report Tool (BART) allow you to detect?
What type of condition does Basic Audit and Report Tool (BART) allow you to detect?
What is the disadvantage of enabling this feature?
Solaris 10 includes the ability to lock a user’s account after a fixed number of failed login accounts. What is the disadvantage of enabling this feature?
Which three steps do you have to take to enable telnet on db and restrict access to it, so that only traffic f
During the installation of your database
server db, you disabled telnet access to it by running inetadm -d
telnet, because your company security policy prohibits unencrypted
access to the systems. You also added a default deny access policy:
# cat /etc/hosts.deny ALL: ALL Now a legacy application running
on the legacy server needs access to the db server, using telnet, and you have been asked to implement the changes. Which three steps do you have to take to enable telnet on db and restrict access to it, so that only traffic from legacy is allowed? (Choose three.)
Which command allows you to do that?
A user that you are investigating is logged in on a system with auditing enabled. The user is running vi, and you need to log which files the user is accessing. Unfortunately, the fr class is not audited, so you want to explicitly alter the audit pre-selection mask for this vi process. Which command allows you to do that?
How would the server treat requests made by the client?
An NFSv4 client has a user jupiter from domain example.com. The NFS server is in the ficticious.com domain and knows the user as jupiter as well. How would the server treat requests made by the client?
How should this file system be mounted defensively in /etc/vfstab?
An application file system stores unchanging data only. How should this file system be mounted defensively in /etc/vfstab?
Which two statements are true when applying the Solaris Security Toolkit software to a system with non-global
Which two statements are true when applying the Solaris Security Toolkit software to a system with non-global zones installed? (Choose two.)
Which three items are the most relevant when trying to prevent resource exhaustion attacks?
Which three items are the most relevant when trying to prevent resource exhaustion attacks? (Choose three.)