1.
What is the purpose of the Solaris cryptographic framework metaslot?
2.
A large financial company has run through their annual external security audits. One section of the audit report handles password security. The auditors request to change the system to allow account locking after three failed logins. They found that the account locking feature was already enabled, but the accounts are locked
after five failed login attempts. There is a system default for the number of failed login attempts before the account is locked. Which is the correct place to set a new system-wide default?
3.
Based on this output from verifying a signed patch.
Which statement is correct?
4.
A company has produced several inhouse applications that have to deal with authentication using passwords. The Solaris systems have been reconfigured to use the password history checking option. What is the impact of this change for their applications?
5.
An administrator has designed a system as an Internet proxy server. This system has been installed with packages that support the proxy software and secure administration. All other packages have been removed from the system. Which statement describes the system installation?
 
6.
An administrator is required to minimize an installed Solaris system. Which command is used to query which packages are installed?
7.
One of the operators of the mainframe group was moved to the UNIX group and tasked to activate and configure password history. For every user, the last 10 passwords should be remembered in the history. In what file is the size of the password history configured?
8.
A security administrator would like to restrict the number of simultaneous lightweight processes (LWPs) that the webadm role may have at any given time. The security administrator has created the following policy in /etc/projects:
user.webadm: 10000::: :task.max-lwps=(privileged,5 deny)
What will be the impact if the webadm role attempted to start a sixth LWP?
9.
The Internet Key Exchange (IKE) protocol is defined in RFC 2409. What describes what this protocol is responsible for implementing?
10.
The Solaris 10 cryptographic framework provides a set of end user commands. One of these new commands allows the encryption and decryption of a file. In encryption, a file named clear_file with this utility gives this error:
# encrypt -a 3des -k 3_des.key -i clear_file -o encrypt_file
encrypt: failed to generate a key: CKR_ATTRIBUTE_VALUE_INVALID
What is the cause?