1.
You suspect that one of your systems has been compromised. You want to inspect the system's binaries and kernel modules by calculating hashes for them and comparing the hashes to the Solaris Fingerprint Database. What prerequisite step should you take before generating the hashes?
2.
After using the Solaris Security Toolkit on a system, some of your users have complained that they are no longer able to connect to the system through telnet.
Which option will allow users to connect to the system without impacting security?
3.
The Key Distribution Center (KDC) is a central part of the Kerberos authentication system. How should the system running the KDC be configured?
4.
A security administrator has a requirement to identify that changes have been made to files under a specific set of directories. This requirement indicates that the control should check for changes to file ownership, permissions, and content. What would best meet the needs of the security administrator?
5.
In which Solaris OS subsystem is User Rights Management implemented?
6.
An administrator has applied patch 120543-02 to a server. Unfortunately, this patch is causing compatibility problems with one of the core applications running on that server. The patch needs to be backed out to solve the application problems. Which command performs the uninstallation of this patch?
7.
Traditionally, UNIX systems have allowed users to hard-link files of other users. Your company's current policy disallows this, and you need to implement this change. In the Solaris 10 OS, there is a special privilege that controls this particular capability:

the file_link_any privilege.
Which statement is true?
8.
Can a global zone administrator prevent a non-global zone administrator from running the sendmail program?
9.
You have a legacy non-privilege aware program which runs as root to be able to open a privileged port. Now that you have upgraded the system to Solaris 10 you want to take advantage of privileges. You can either run the program as root with fewer privileges, or you can run the program as daemon with additional privileges.
Why is it preferred to run the program as daemon with added privileges?
10.
A single system must run a number of different network services. Among them is a web server, a mail server, a DNS server, and a MySQL database used by an e- commerce application. After several months of successful operation, a compromise is discovered: an attacker exploited a vulnerability in the mail server and ultimately obtained a root shell. However, none of the highly sensitive personal information in the e-commerce database was compromised, nor was the operation of the web server or DNS server affected. How can this be?