What is the impact of this change for their applications?
A company has produced several inhouse applications that
have to deal with authentication using passwords. The Solaris systems have been
reconfigured to use the password history checking option. What is the impact of this change for their applications?
Which two actions will permit thesecadm account to restart the cron service?
While attempting to restart the cron service on a Solaris 10
system from the secadm account, a security administrator receives the following error
message: secadm$ svcadm -v restart cron svcadm: svc:/system/cron:default: Couldn’t create
"restarter_actions" property group (permission denied). Which two actions will permit the
secadm account to restart the cron service? (Choose two.)
Which file do you need to modify to disable the use of .rhosts files?
To allow a legacy system to connect to one of your hosts, you are required to enable remote login (rlogin) connections. However, you wish to disable the ability for users to use .rhosts files to allow password-less logins. You have enabled rlogin connections by running the following command: # svcadm enable network/login:rlogin Which file do you need to modify to disable the use of .rhosts files?
Which name services currently support this feature?
Solaris 10 provides password history checking out of the box. Which name services currently support this feature?
Which two statements are true?
A Solaris 10 system has IP Filter enabled and configured. A section of the /etc/ipf/ipf.conf configuration file is reported below: block return-rst in quick proto tcp from any to any port = 23 flags S block return-icmp (port-unr) in proto udp from any to any port > 3000 Which two statements are true? (Choose two.)
Which describes the capabilities of the crypt command?
Which describes the capabilities of the crypt command?
Which command sequence would you use to verify that the public key is synchronized between security associatio
Which command sequence would you use to verify that the public key is synchronized between security associations (SA)?
How can this be?
A single system must run a number of different network services. Among them is a web server, a mail server, a DNS server, and a MySQL database used by an e-commerce application. After several months of successful operation, a compromise is discovered: an attacker exploited a vulnerability in the mail server and ultimately obtained a root shell. However, none of the highly sensitive personal information in the e-commerce database was compromised, nor was the operation of the web server or DNS server affected. How can this be?
Can a global zone administrator prevent a non-global zone administrator from running the sendmail program?
Can a global zone administrator prevent a non-global zone administrator from running the sendmail program?
Which three steps do you have to take to enable telnet on db and restrict access to it, so that only traffic f
During the installation of your database server db, you disabled telnet access to it by running inetadm -d telnet, because your company security policy prohibits unencrypted access to the systems. You also added a default deny access policy: # cat /etc/hosts.deny ALL: ALL Now a legacy application running on the legacy server needs access to the db server, using telnet, and you have been asked to implement the changes. Which three steps do you have to take to enable telnet on db and restrict access to it, so that only traffic from legacy is allowed? (Choose three.)