What will this ssh command do?
A user started the ssh-agent followed by the ssh-add command. Afterwards the user connects to a remote system by using the ssh command. What will this ssh command do?
which needs to be installed?
After minimizing and hardening a system, application software was installed but could not run. The administrator already found that /usr/lib/libz.so.1 is missing on the system. The package containing this library needs to be installed, but the administrator does not know the name of the corresponding package.The system is booted from the installed OS and the installation media is mounted. Which command can be used to find the name of the package which needs to be installed?
Which prints out all world-writable files?
Which prints out all world-writable files?
Which will NOT be a factor in the size of the audit trail generated by the system?
On a system with these settings in audit_control: dir:/var/audit flags:lo,ex,nt naflags:na minfree:20 Which will NOT be a factor in the size of the audit trail generated by the system?
Which two are concerned with security threats?
Which two are concerned with security threats? (Choose two.)
Which is a requirement for signed patches?
The digital signature of a patch provides an integrity check of the patch. Which is a requirement for signed patches?
What option is open to the system administrator?
A system administrator wants to share NFS file systems to two different sets of systems. Both sets of systems require integrity checks and Kerberos authentication. The second set of systems also requires encryption. What option is open to the system administrator?
Which three of the zone’s properties can differ from the global zone?
For security reasons, one of the services your department provides
has to be run in a separate zone. Which three of the zone’s properties can differ from the global zone? (Choose three.)
What are two considerations that the security administrator should understand before making this change?
To improve accountability on a Solaris system, the security administrator decides to configure the root account to be a Solaris role. What are two considerations that the security administrator should understand before making this change? (Choose two.)
Which action must be taken to enable TCP wrappers for the telnet protocol?
To enforce security within your organization, access restrictions to systems must be applied. In particular, restrictions to the telnet protocol must be configured. Which action must be taken to enable TCP wrappers for the telnet protocol?