Which option is used in /etc/vfstab to limit the size of a tmpfs(7FS) file system to 512MB to prevent a memory
Which option is used in /etc/vfstab to limit the size of a tmpfs(7FS) file system to 512MB to prevent a memory denial of service (DoS)?
What is the name of the tool used to change the minfree threshold?
To prevent regular users from filling up a file system partition, you can specify a minfree option to newfs. If you forget to specify this option when the file system is created, the file system characteristics can be changed at a later time.
What is the name of the tool used to change the minfree threshold?
What is the impact on the system?
Refer to the Exhibit.
As the result of a weak security configuration, an attacker is able to gain local access to a system. Next, the attacker gains administrative access by exploiting a local buffer overflow in the ufsrestore(1M) program because it had not been properly patched. Continuing, the attacker executes the commands found in the exhibit.
What is the impact on the system?
Which is a possible security concern with this configuration?
During a security assessment of a Solaris OE system, the examiner finds the run-control script, /etc/rc3.d/S20myapp. After verifying the need for this script with the system’s custodian, the examiner notices that the script starts a program in /opt/myapp/bin.
Which is a possible security concern with this configuration?
Which two describe attack methods that can cause a user to unexpectedly execute a Trojan horse instead of an i
Which two describe attack methods that can cause a user to unexpectedly execute a Trojan horse instead of an intended setuid program? (Assume only that the user’s shell initialization file is writable to the attacker.)
Which three commands are often replaced by root kits?
You decide that it may be a good idea to prevent Trojan horse and backdoor attacks. Which three commands are often replaced by root kits? (Choose three.)
What can you use to list the contents of a directory prior to starting your forensic analysis?
You suspect that the ls(1) command may have been Trojaned on a Solaris 9 OE system. What can you use to list the contents of a directory prior to starting your forensic analysis?
What is the reason?
/var filled up, and even though you delete some large files, /var immediately fills up again. Apparently, some process is writing to a file in /var at high speed.
You use /bin/find to search for a large and recently changed file in /var, but nothing shows up.
What is the reason?
What are three results of a fork-bomb denial of service (DoS) attack on a CPU?
What are three results of a fork-bomb denial of service (DoS) attack on a CPU? (Choose three.)
What prerequisite step should you take before generating the checksums?
You suspect that one of your systems has been compromised. You want to inspect the system’s binaries and kernel modules by checksumming them and comparing them to the Solaris Fingerprint Database. What prerequisite step should you take before generating the checksums?