1.
A user started the ssh-agent followed by the ssh-add command. Afterwards the user connects to a remote system by using the ssh command. What will this ssh command do?
2.
An application file system stores unchanging data only. How should this file system be mounted defensively in /etc/vfstab?
3.
A startup company suspects that one of its sales people is accessing confidential research and development files, which are kept on a Solaris 10 system, and leaking their contents to the press. Which measure can the system administrator put in place to detect this activity?
4.
The Solaris 10 cryptographic framework provides a set of end user commands. One of these new commands allows the encryption and decryption of a file. In encryption, a file named clear_file with this utility gives this error: # encrypt -a 3des -k 3_des.key -i clear_file -o encrypt_file encrypt: failed to generate a key:
CKR_ATTRIBUTE_VALUE_INVALID. What is the cause?
5.
During a recent Solaris security assessment, a security administrator found a directory on a local UFS file system that contained the following files: $ ls -@ total 7200 -rwxr-----+ 1 webadm webadm 1048576 Jun 6 15:34 bar -rw---l--- 1 webadm webadm 512000 Jun 6 15:35 baz -rw-------@ 1 webadm webadm 2097152 Jun 6 15:34 foo. What is the meaning of the @ symbol associated with file foo?
6.
Traditionally, UNIX systems have allowed users to hard-link files of other users. Your company's current policy disallows this, and you need to implement this change. In the Solaris 10 OS, there is a special privilege that controls this particular capability: the file_link_any privilege. Which statement is true?
7.
A security administrator needs to configure a Solaris system to act as a firewall between your company's corporate network and the Internet, using Solaris IP Filter software to control the traffic passing between these two networks. Which is an efficient way to limit the software that can be run on this system?
8.
Which statement is true about applying Solaris patches to zones?
9.
You want to know when, by whom, and how privileges are used on one of your systems. How can you get that information?
10.
To harden a newly installed Solaris OS, an administrator needs to disable the sendmail service. Which command will disable the sendmail service, even if the system is rebooted, patched, or upgraded, while still allowing email to be sent?