What enables a remote root shell, bypassing the PAM mechanism?
An attacker has compromised a system by guessing a user account. The attacker then escalates privileges through a Trojan horse. The attacker will then put back doors on the system. What enables a remote root shell, bypassing the PAM mechanism?
Which is NOT a result of a host-based denial of service attack?
Which is NOT a result of a host-based denial of service attack?
Which parameter must be changed in /etc/default/login to enable this functionality?
A site security policy dictates that all failed logins to critical systems must be logged and monitored. Which parameter must be changed in /etc/default/login to enable this functionality?
which command results in the execution of a device clean script?
When BSM is enabled, which command results in the execution of a device clean script?
which log file should the security administrator check?
To detect if user sam has assumed the identity of user bob on a system, which log file should the security administrator check?
Which file is unused in device allocation?
Which file is unused in device allocation?
Which command is used to configure BSM to track all arguments to an executed command?
Which command is used to configure BSM to track all arguments to an executed command?
Which type of user interactions will Solaris process accounting report?
Which type of user interactions will Solaris process accounting report?
What is an operational limitation of this server?
The company security policy requires all application servers to be hardened and minimized. A hardened and minimized application server is built and tested in a test network. The application server is deployed in a production network. What is an operational limitation of this server?
What is the functional purpose of the Solaris Security Toolkit?
What is the functional purpose of the Solaris Security Toolkit?