which directory should a new Solaris 9 PAM module be installed?
Under which directory should a new Solaris 9 PAM module be installed?
What is the method used by Sun Kerberos to protect user passwords?
What is the method used by Sun Kerberos to protect user passwords?
Which statement is true about the crypt(1) command?
Which statement is true about the crypt(1) command?
who has access to the role snooper that in turn has access to the profile Network Manager?
How would you set up a user called dhoch who has access to the role snooper that in turn has access to the profile Network Manager?
Which command is used to print all world-writable files?
Which command is used to print all world-writable files?
Why is this a bad decision?
While looking for dormant accounts, you notice that lastlog has become very large. Because space is tight on your /var partition, you decide to add this file to the list of files that is rotated by logadm. Why is this a bad decision?
Which three naming services support password expiration?
Which three naming services support password expiration? (Choose three.)
What do Protection Profiles describe?
What do Protection Profiles describe?
Which three topics must be described in an IT security policy?
Which three topics must be described in an IT security policy? (Choose three.)
Which activity is considered a network security control?
Which activity is considered a network security control?