PrepAway - Latest Free Exam Questions & Answers

Category: 310-303

Exam 310-303: Sun Certified Security Administrator for the Solaris 10 OS

Which two actions will permit thesecadm account to restart the cron service?

While attempting to restart the cron service on a Solaris 10
system from the secadm account, a security administrator receives the following error
message: secadm$ svcadm -v restart cron svcadm: svc:/system/cron:default: Couldn’t create
"restarter_actions" property group (permission denied). Which two actions will permit the
secadm account to restart the cron service? (Choose two.)

Which file do you need to modify to disable the use of .rhosts files?

To allow a legacy system to connect to one of your hosts, you are required to enable remote login (rlogin) connections. However, you wish to disable the ability for users to use .rhosts files to allow password-less logins. You have enabled rlogin connections by running the following command: # svcadm enable network/login:rlogin Which file do you need to modify to disable the use of .rhosts files?

How can this be?

A single system must run a number of different network services. Among them is a web server, a mail server, a DNS server, and a MySQL database used by an e-commerce application. After several months of successful operation, a compromise is discovered: an attacker exploited a vulnerability in the mail server and ultimately obtained a root shell. However, none of the highly sensitive personal information in the e-commerce database was compromised, nor was the operation of the web server or DNS server affected. How can this be?

Which three steps do you have to take to enable telnet on db and restrict access to it, so that only traffic f

During the installation of your database server db, you disabled telnet access to it by running inetadm -d telnet, because your company security policy prohibits unencrypted access to the systems. You also added a default deny access policy: # cat /etc/hosts.deny ALL: ALL Now a legacy application running on the legacy server needs access to the db server, using telnet, and you have been asked to implement the changes. Which three steps do you have to take to enable telnet on db and restrict access to it, so that only traffic from legacy is allowed? (Choose three.)


Page 3 of 2012345...1020...Last »