1.
Where should you look to determine which Certificate Authorities are trusted by Safari?
2.
You want to give the group labadmin the ability to unlock any user's screen saver, but not give the group any further administrative rights. How do you do this?
3.
You have various sensitive documents that you want to keep encrypted, while still being able to distribute them to others. Which feature is best for this task?
4.
According to Password Assistant's policy rules, a memorable password consists of ________.
5.
Which statement describes a practical approach to enforcing security for a computer that has programs owned by root which have the SUID bit set?
6.
Which action will enable ACLs on a Mac OS X v10.4 volume?
7.
You must configure Mac OS X so that each of your users can access his or her home folder over the network. Which service, if used to accomplish this goal, would cause a weak hash of each users password to be stored in the shadow hash file?
8.
Which statement describes an effective method to conceal an installed rootkit?
9.
How do you enable SpamAssassin in Mail services in Mac OS X Server v10.4?
10.
Consider the following folder listing:
drwxrwxrwt 5 root staff 170 May 20 16:39 /Users/Public/Shared/
Inside the folder is the file Report.rtf:
-rw-r--r-- 1 kim staff 0 Oct 11 15:51 Report.rtf
Who can delete Report.rtf?