You maintain an extremely protective policy when configuring your firewall rules. Your security policy denies all inbound connection requests to your corporate network. How is it possible that you still experience remote exploits your adversaries are using to obtain interactive sessions inside your firewall? A. TCP splicing is easy to do. B. Internal software may […]
What is the significance of the output generated by the jass-check-sum command shown in the exhibit?
Refer to the Exhibit. What is the significance of the output generated by the jass-check-sum command shown in the exhibit? A. The two files were deleted since the last Solaris Security Toolkit run. B. The two files were created since the last Solaris Security Toolkit run. C. The two files were modified since the last […]
Where should this module be declared in the PAM stack to install it as an additional strength checking measure
Refer to the Exhibit. Your company has acquired a PAM module to implement dictionary checks at password-change time. Where should this module be declared in the PAM stack to install it as an additional strength checking measure? (Choose two.) A. before the line containing pam_dhkeys.so.1 B. after the line containing pam_authtok_check.so.1 C. after the line […]
You administer a system which has BSM enabled. You just added an extra audit-class to the flag: entry in /etc/security/audit_control, and you executed audit -s. Now you want to validate that this extra class is audited correctly, so you execute a command that should generate an audit record. Unfortunately, nothing appears in the audit log […]
Refer to the Exhibit. You notice that the following line has been added to /etc/passwd: admin:x:0:0:Administrator:/:/bin/sh You try to determine when this file was changed. You look at the file creation date, but based on that information, the file has not been touched since the system was installed. You look at the BSM logs for […]
Refer to the Exhibit. Which connection demonstrates that telnet has been denied using TCP Wrappers? A. Connection 1 B. Connection 2 C. Connection 3 D. Connection 4 Show Answer
User alice begins to log in to a remote server named foo using Solaris Secure Shell. This message is displayed: The authenticity of host foo can’t be established. RSA key fingerprint in md5 is: 04:9f:bd:fc:3d:3e:d2:e7:49:fd:6e:18:4f:9c:26 Are you sure you want to continue connecting(yes/no)? What is the meaning of the message? A.The user alice is being […]
Which entry in /etc/inet/inetd.conf protects the in.fingerd service using TCP Wrappers? A.finger stream tcp6 nowait nobody /usr/sfw/sbin/tcpd in.fingerd B.finger stream tcp6 nowait nobody in.fingerd /usr/sfw/sbin/tcpd C.in.fingerd stream tcp6 nowait nobody /usr/sfw/sbin/tcpd finger D.in.fingerd stream tcp6 nowait nobody finger /usr/sfw/sbin/tcpd Show Answer
Which user configuration file contains the public keys of trusted remote servers? A./etc/ssh/known_hosts B./etc/ssh/identity.pub C.$HOME/.ssh/known_hosts D.$HOME/.ssh/identity.pub Show Answer
Which command forwards the TCP port 3001 on the local host to the telnet port on the remote host xyzzy?
Which command forwards the TCP port 3001 on the local host to the telnet port on the remote host xyzzy? A.telnet xyzzy 3001 B.rsh xyzzy telnet 3001 C.ssh localhost:3001 xyzzy:23 D.ssh -L3001:localhost:23 xyzzy Show Answer