What are two security tasks that the security administrator should perform?
A security administrator has a requirement to help configure and deploy a new server. What are two security tasks that the security administrator should perform? (Choose two.)
Which two qualities are assured when a patch signature is verified?
A cryptographically signed patch provides system administrators with assurance that the patch possesses certain qualities. Which two qualities are assured when a patch signature is verified? (Choose two.)
Which two command sequences can be used to generate an encrypted backup of the files under /app1?
A security administator has a requirement to make an encrypted backup copy of an application and its data, using the AES algorithm, so that it can be safely transmitted to a partner. Which two command sequences can be used to generate an encrypted backup of the files under /app1? (Choose two.)
Which options will NOT grant the user the ability to read and write the file?
You have been asked to grant the user ennovy, a member of the staff group, read and write access to the file /app/notes which has the following properties: ls -l /app/notes -rw-rw—- 1 root app 0 Jun 6 15:11 /app/notes Which options will NOT grant the user the ability to read and write the file?
Can you just use patchadd to apply the patch to the global zone to update the web server zone?
A new security related patch has been released for the Solaris OS. This patch needs to be applied to the system that functions as your web server. The web server is configured to run in a non-global zone. Can you just use patchadd to apply the patch to the global zone to update the web server zone?
Which is NOT contributing to the defense in depth?
You have been asked to implement defense in depth for network access to a system, where a web server will be running on an Internet-facing network interface. Which is NOT contributing to the defense in depth?
Which are two advantages of the Service Management Facility compared to the init.d startup scripts?
Which are two advantages of the Service Management Facility compared to the init.d startup scripts? (Choose two.)
Which supported method can be used to configure syslogd like this?
To harden a newly installed Solaris OS, an administrator is required to make sure that syslogd is configured to NOT accept messages from the network. Which supported method can be used to configure syslogd like this?
Which two commands are part of Sun Update Connection?
Which two commands are part of Sun Update Connection? (Choose two.)
What is one of the dangers of having password composition too tightly constrained?
The /etc/default/passwd file contains a number of configuration parameters that can be used to constrain the character composition of user passwords. What is one of the dangers of having password composition too tightly constrained?