Which item in the list would be specifically required for a VPN compared to a mode without encryption?
Which item in the list would be specifically required for a VPN compared to a mode without encryption?
when required?
A user needs to be able to mount the file system located on a USB memory stick on a workstation. How can you allow the user to mount and unmount this file system when required?
what are two benefits of enabling Solaris Auditing in the global zone on a system where non-global zones (NGZ)
By default, what are two benefits of enabling Solaris Auditing in the global zone on a system where non-global zones (NGZ) have been deployed? (Choose two.)
Which of the descriptions is a high-level overview of how Kerberos works?
Which of the descriptions is a high-level overview of how Kerberos works?
What will be the impact if the webadm role attempted to start a sixth LWP?
A security administrator would like to restrict the number of simultaneous lightweight processes (LWPs) that the webadm role may have at any given time. The security administrator has created the following policy in /etc/projects: user.webadm:10000::::task.max-lwps=(privileged,5,deny) What will be the impact if the webadm role attempted to start a sixth LWP?
Which event will NOT be reported by comparing the two manifests with BART?
The security administrator has created a Basic Audit and Report Tool (BART) control manifest for the /etc directory. A test manifest is created about one hour later, and the two manifests are compared. The administrator checks all attributes for the files in /etc. Which event will NOT be reported by comparing the two manifests with BART?
Which will NOT be a factor in the size of the audit trail generated by the system?
On a system with these settings in audit_control: dir:/var/audit
flags:lo,ex,nt naflags:na minfree:20 Which will NOT be a factor in the size of the audit trail generated by the system?
which two ways can a service administrator specify the privilege set of a particular service in the Service Ma
In which two ways can a service administrator specify the privilege set of a particular service in the Service Management Facility? (Choose two.)
Which two statements regarding Solaris Security Toolkit are correct?
It is corporate practice to use the Solaris Security Toolkit on all Sun systems. This has been sucessfully done for years, and the administrators are experienced with the tool. Starting with Solaris 10, the company now also uses Solaris zones. Which two statements regarding Solaris Security Toolkit are correct? (Choose two.)
which Solaris OS subsystem is User Rights Management implemented?
In which Solaris OS subsystem is User Rights Management implemented?