PrepAway - Latest Free Exam Questions & Answers

Tag: 310-303

Sun Certified Security Administrator for the Solaris 10 OS Exam Preparation Material provides you everything you will need to take a SCSA10 certifications examination. Details are researched and produced by Sun Certification Experts who are constantly using industry experience to produce precise, and logical.

Which two actions can be successfully taken by the sysadm role?

A security administrator creates a directory called prevoy with the following access control policy: $ getfacl prevoy # file: prevoy # owner:
secadm # group: secadm user::rwx group::r-x #effective:r-x mask:r-x other:r-x default:user::r– default:user:sysadm:rw- default:group::r– default:group:sysadm:rw- default:mask:rwx default:other:— Into this directory, the security administrator creates a file called secrets. The ls command reports the following for the prevoy directory and secrets file: $ ls -ld . secrets drwxr-xr-x+ 2 secadm secadm 512 Jun 6 16:38 . -r–r—–+ 1 secadm secadm 0 Jun 6 16:38 secrets Which two actions can be successfully taken by the sysadm role? (Choose two.)

What will you modify to specify the privileges that the web service will run with?

You are configuring a new system to be used as an intranet web server. After you have installed the minimal amount of packages and patched the system, you added the appropriate web server packages (SUNWapch2r and SUNWapch2u). By default, the web server daemon will be started using UID webservd and the basic privilege set. To comply with the company’s policy of least privilege, you need to minimize the privileges that the web server will have. What will you modify to specify the privileges that the web service will run with?

What command, available by default in Solaris 10, will help the security administrator collect the necessary i

A security administrator is required to validate the integrity of a set of operating system files on a number of Solaris systems. The administrator decides to use the Solaris Fingerprint Database to validate configuration and data files as well as binaries and libraries. What command, available by default in Solaris 10, will help the security administrator collect the necessary information that will be used with the Solaris Fingerprint Database?

which is a solution to this problem?

The company security policy now requires very detailed auditing of all actions. This includes capturing all executed commands together with their arguments and the environment variables. After activating auditing on all Solaris 10 systems, the security auditor complains about having to check the audit trail on each individual host. He asks for a central place to capture all audit trails. Using standard Solaris 10 security features, which is a solution to this problem?


Page 19 of 20« First...10...1617181920