A user started the ssh-agent followed by the ssh-add command. Afterwards the user connects to a remote system by using the ssh command. What will this ssh command do?
An administrator has been tasked with the installation of 20 systems. The systems will be identical and are located both on the local network and on remote networks, although all of the hardware is network accessible. Which installation method is best suited for this task?
It is corporate practice to use the Solaris Security Toolkit on all Sun systems. This has been successfully done for years, and the administrators are experienced
with the tool. Starting with Solaris 10, the company now also uses Solaris zones. Which two statements regarding Solaris Security Toolkit are correct? (Choose
two.)
The Solaris 10 cryptographic framework provides user-level commands to encrypt files. A combination of commands is reported below:
# tar cvf. /data I encrypt -a arcfour -k /tmp/key -o /tmp/backup
Which two statements are true? (Choose Iowa.)
A company has activated auditing on all of their systems. The default destination directory for the audit trail is A/ar/audit on each system. In the past few weeks, they had problems with one of the systems acting as a print server. A user sent a large print job which caused/var on the print server to become full. As a result, auditing
was no longer working. They changed the /etc/security/audit_control file to include a second destination directory (using the dir keyword). When will the audit subsystem switch from the first directory to the second configured directory?
An administrator has designed a system as an Internet proxy server. This system has been installed with packages that support the proxy software and secure administration. All other packages have been removed from the system. Which statement describes the system installation?
A large financial company has run through their annual external security audits. One section of the audit report handles password security. The auditors request to change the system to allow account locking after three failed logins. They found that the account locking feature was already enabled, but the accounts are locked after five failed login attempts. There is a system default for the number of failed login attempts before the account is locked. Which is the correct place to set a new system-wide default?
During a recent security audit, it was noted that a number of users within an organization regularly share their password details with other users, even though this is specifically forbidden in the Security Policy. Which step can be taken to reduce the incidence of password sharing?