A company develops storage host bus adapters. All of the company’s disk arrays log messages to a central log host named scribe through the local5 facility. Some of these disk arrays are used for production work by human resources and some are used by the development teams to test their new host bus adapters.
The previous administrator put the following line in the /etc/syslog.conf file on scribe to log messages
from the arrays:
Recently, the development team encountered a difficult problem and turned on the full debug output from a disk array. They request that scribe log all of that information.
Logging all of the debug messages will create a large number of messages that could cause an administrator to overlook real problems with the production disk arrays or to overlook scribe system problems.
You want to have the syslog.conf file stop using /var/adm/messages for the local5 facility messages. You
want to log warning and above levels for the local5 facility to /var/adm/arrays.messages and log debug
and above level messages for the local5 facility to /var/adm/arrays.debug.
Which two statements in /etc/syslog.conf will accomplish this? (Choose two.)
Which two statements are true about the /etc/syslog.conf file? (Choose two.)
Several systems are using system blue as a log host. Given the following syslog messages in the /var/adm/messages file on system blue:
Jan 27 10:53:09 mailserver root: [ID 702911 mail.crit] The mail server is down
Jan 27 10:54:38 webserver utmp_update: [ID 845426 user.error] Wrong number of arguments
Jan 27 10:55:54 fileserver ufs: [ID 845546 kern.notice] NOTICE: alloc: /data: file system full
Which statement is true?
A Solaris 10 OS is configured to log to the /var/adm/messages file using syslog.
Which two statements are correct? (Choose two.)
The system administrator assigned a profile entry with sufficient rights to execute the snoop command. The user reports that it does NOT work. The system administrator wants the command to work automatically for the user. The system administrator verifies that the RBAC database entries are correct.
What are two solutions for this problem? (Choose two.)
The /etc/user_attr file on your system contains the following entry:
Which two statements are true about this entry? (Choose two.)
A department needs a directory that can be used to exchange files between department members without allowing other employees access to the files. The department’s employees are part of different UNIX groups and company policy dictates a umask of 007.
You create a new UNIX group named shareit, and make the department’s employees part of this group.
You also change the ownership of the directory to this group, and set the mode to 0770.
What additional setting should you apply?
A user has an entry in both of the files that manage access to the crontab command.
What is the result when the user tries to run the crontab command?
[ Jan 26 16:54:28 Leaving maintenance because clear requested. ] [ Jan 26 16:54:28 Enabled. ] [ Jan 26 16:54:28 executing start method ("/lib/svc/method/sshd start") ] Could not load host key: /etc/ssh/ssh_host_rsa_key Could not load host key: /etc/ssh/ssh_host_dsa_key Disabling protocol version 2. Could not load hostkey or GSS-API mechanisms sshd: no hostkeys available — exiting.
[ Jan 26 16:54:28 Method "start" exited with status 1 ]
Which two statements are true? (Choose two.)
The security policy of your company dictates that root logins are only allowed on the console of a system.
Which variable should be set?