Your company has acquired a small company and your task is to set up the first Solaris server in their network. As there is no existing JumpStart environment, you will have to start from scratch. Which metacluster is best suited for initial installation of a strict minimized system?
You suspect that the /usr/bin/ls binary on a system might have been replaced with a "Trojan horse." You have been able to determine that the correct MD5 checksum for the real /usr/bin/ls binary is: md5 (/usr/bin/ls) = b526348afd2d57610dd3635e46602d2a. Which standard Solaris command can be used to calculate the MD5 checksum for the /usr/bin/ls file?
An administrator has applied patch 120543-02 to a server. Unfortunately, this patch is causing compatibility problems with one of the core applications running on that server. The patch needs to be backed out to solve the application problems. Which command performs the uninstallation of this patch?
You suspect that the /usr/bin/ls binary on a system might have been replaced with a "Trojan horse." You have been able to determine that the correct MD5 checksum for the real /usr/bin/ls binary is: md5 (/usr/bin/ls) = b526348afd2d57610dd3635e46602d2a. Which standard Solaris command can be used to calculate the MD5 checksum for the /usr/bin/ls file?
A system administrator wants to remove most of the basic privileges for ordinary users and adds the following line to the appropriate configuration file to achieve this:
PRIV_DEFAULT=basic,!proc_info,!proc_session,!
file_link_any It would be shorter to list the two remaining privileges specified in Solaris 10. Should the administrator have written this instead?
PRIV_DEFAULT=proc_exec,proc_fork
A security administrator has been asked to construct a Solaris Security Toolkit security profile (that is, driver) to enable Solaris Auditing. If the security administrator starts with the secure.driver profile, which Finish script must be added to enable Solaris Auditing?
To enforce security within your organization, access restrictions to systems must be applied. In particular, restrictions to the telnet protocol must be configured.
Which action must be taken to enable TCP wrappers for the telnet protocol?