What is the smallest Solaris OE meta-cluster that includes Solaris Secure Shell?
What is the smallest Solaris OE meta-cluster that includes Solaris Secure Shell?
Which three actions must be taken by the administrator to correctly respond to the audit finding?
As a result of a recent security audit, a security administrator is told to restrict access to the telnet and ftp services to a set of administrative workstations. All other services started from inetd should be disabled. Which three actions must be taken by the administrator to correctly respond to the audit finding? (Choose three.)
What service can be configured to identify and authenticate users by public key cryptography?
What service can be configured to identify and authenticate users by public key cryptography?
Which two activities are components of a risk management process?
Which two activities are components of a risk management process? (Choose two.)
What is the primary objective of the Controlled Access Protection Profile?
What is the primary objective of the Controlled Access Protection Profile?
What is the primary reason that systems are unsecure?
What is the primary reason that systems are unsecure?
An attacker wants to gain information using technical engineering methods. The attacker can _____. (Choose two
An attacker wants to gain information using technical engineering methods. The attacker can _____. (Choose two.)
Which three must a security administrator first identify and clearly understand before securing a new server?
Which three must a security administrator first identify and clearly understand before securing a new server? (Choose three.)
What action do you take?
You want to prevent service foo from starting at boot time. What action do you take?
When should the network interfaces be connected?
While building a web server, a security administrator performs these steps:
1. installs the Solaris Operating Environment from CD-ROM
2. installs the Solaris Security Toolkit on the server
3. executes the Solaris Security Toolkit to perform hardening of the server
4. reboots the server
When should the network interfaces be connected?