when, by whom, and how privileges are used on one of your systems. How can you get that information?
You want to know when, by whom, and how privileges are used on one of your systems. How can you get that information?
Which statement is true about applying Solaris patches to zones?
Which statement is true about applying Solaris patches to zones?
Which statement is true?
Traditionally, UNIX systems have allowed users to hard-link files of other users. Your company’s current policy disallows this, and you need to implement this change. In the Solaris 10 OS, there is a special privilege that controls this particular capability: the file_link_any privilege. Which statement is true?
What is the meaning of the @ symbol associated with file foo?
During a recent Solaris security assessment, a security administrator found a directory on a local UFS file system that contained the following files: $ ls -@ total 7200 -rwxr—–+ 1 webadm webadm 1048576 Jun 6 15:34 bar -rw—l— 1 webadm webadm 512000 Jun 6 15:35 baz -rw——-@ 1 webadm webadm 2097152 Jun 6 15:34 foo What is the meaning of the @ symbol associated with file foo?
What is thecause?
The Solaris 10 cryptographic framework provides a set of end user
commands. One of these new commands allows the encryption and decryption of a file. In encryption, a file named clear_file with this utility gives this error: # encrypt -a 3des -k 3_des.key -i clear_file -o encrypt_file encrypt: failed to generate a key: CKR_ATTRIBUTE_VALUE_INVALID What is the
cause?
Which measure can the system administrator put in place to detect this activity?
A startup company suspects that one of its sales people is accessing confidential research and development files, which are kept on a Solaris 10 system, and leaking their contents to the press. Which measure can the system administrator put in place to detect this activity?
Which three are useful tools to monitor the integrity of a system?
Which three are useful tools to monitor the integrity of a system? (Choose three.)
Which two Solaris features could you use to allow this application to run without giving it full root access t
An application that you are installing needs to be able to run the snoop command, which normally requires root access. Which two Solaris features could you use to allow this application to run without giving it full root access to your system? (Choose two.)
Which three statements are correct?
After returning from training, the
security administrator is getting asked by his coworkers about the features of Solaris auditing. He starts with some basic information. Which three statements are correct? (Choose three.)
How should this file system bemounted defensively in /etc/vfstab?
An application file system stores
unchanging data only. How should this file system be
mounted defensively in /etc/vfstab?