what is incorrect with the command?
Refer to the Exhibit. Given a fresh new installation of a Solaris 10 system from a genuine DVD media kit, the output of the command shown in the Exhibit fails to verify the /bin/bart elf binary file. Assuming that the binary file is genuine, what is incorrect with the command?
What caused the error from BART?
Refer to the Exhibit. The Exhibit shows the contents of a file named rule, and the output of a Basic Audit and Report Tool (BART) command. The purpose of the command is to create a manifest file of the directory /opt/SUNWrtvc, but unfortunately the command did not succeed. What caused the error from BART?
Should the administrator have written this instead?
A system administrator wants to remove most of the basic privileges for ordinary users and adds the following line to the appropriate configuration file to achieve this: PRIV_DEFAULT=basic,!proc_info,!proc_session,!file_link_any It would be shorter to list the two remaining privileges specified in Solaris 10. Should the administrator have written this instead? PRIV_DEFAULT=proc_exec,proc_fork
What is the significance of the output generated by the jass-check-sum command?
Refer to the Exhibit. What is the significance of the output generated by the jass-check-sum command?
which statement is correct?
Refer to the Exhibit. Based on this output from verifying a signed patch, which statement is correct?
Which two locations would put this module in the PAM stack when you install this module as an additional stren
Refer to the Exhibit. To implement dictionary checks at password-change time, your company has acquired a PAM module that performs these checks. Which two locations would put this module in the PAM stack when you install this module as an additional strength checking measure? (Choose two.)
What action must be taken?
Due to changes to the security policy of your organization, access restriction must be applied to systems. The changes specify that access to systems through the ftp protocol is NOT allowed according to the Human Resources department, which has the 10.10.10.0/24 address space assigned. TCP wrappers have been enabled for the ftp daemon, and these files have been configured: # cat /etc/hosts.allow in.ftpd: ALL # cat /etc/hosts.deny in.ftpd: 10.10.10.0/24 Despite the implemented configuration, Human Resources is still able to access systems through the ftp protocol. What action must be taken?
What setting prevents this cgi-bin program from working?
Refer to the Exhibit. You maintain a minimized and hardened web server. The exhibit shows the current credentials that the web server runs with. You receive a complaint about the fact that a newly installed web-based application does not function. This application is based on a /bin/ksh cgi-bin script. What setting prevents this cgi-bin program from working?
How is it possible that you still suffer from remote exploits that your adversaries are using to obtain intera
You decided it was worth maintaining an extremely paranoid policy when configuring your firewall rules. Therefore, you had your management approve the implementation of a security policy stance to deny all inbound connection requests to your corporate network. How is it possible that you still suffer from remote exploits that your adversaries are using to obtain interactive sessions inside your firewall?
what do you need to do to gather the resource usage information?
You have been asked to let your manager’s children run their homework assignments on one of the servers you administer. You have been promised that it will not impact the overall performance of the server, but you aren’t sure, so you want to track how many resources they use. After you have created a new user called kids and assigned a new project called homework to the user, what do you need to do to gather the resource usage information?