Which two commands are used to detect a memory denial of service (DoS)?
Which two commands are used to detect a memory denial of service (DoS)? (Choose two.)
Which log files should be trusted to track an intrusion after a remote attacker with root privileges compromis
Which log files should be trusted to track an intrusion after a remote attacker with root privileges compromises a system on a local area network (LAN)?
Which three keywords are used to configure the /etc/security/audit_control file?
Which three keywords are used to configure the /etc/security/audit_control file? (Choose three.)
What is the next step that must be performed to begin logging these new events?
A security administrator has modified the /etc/security/audit_control file to enable the auditing of file delete events. What is the next step that must be performed to begin logging these new events?
Which command allows you to do that?
A user that you are investigating is logged in on a system with BSM enabled. The user is running vi, and you need to log which files the user is accessing. Unfortunately, the fr class is not audited, so you want to explicitly alter the audit pre-selection mask for this vi process. Which command allows you to do that?
What can be done to configure this task?
A security administrator wants to use log facility to enter a log entry when system virus scan scripting completes. What can be done to configure this task?
Which is an inappropriate activity for a device clean script?
Which is an inappropriate activity for a device clean script?
Which three questions must be answered before a security policy can be determined?
Which three questions must be answered before a security policy can be determined? (Choose three.)
What problem can occur if you change the output of “revealing information” in a Solaris configurat
You are considering changing the information that nmap -O uses when fingerprinting a host. What problem can occur if you change the output of "revealing information" in a Solaris configuration?
Which network service can provide confidentiality of password data in transit over the network?
Which network service can provide confidentiality of password data in transit over the network?