Where should this module be declared in the PAM stack to install it as an additional strength checking measure

Refer to the Exhibit. Your company has acquired a PAM module to implement dictionary checks at password-change time. Where should this module be declared in the PAM stack to install it as an additional strength checking measure? (Choose two.) A. before the line containing pam_dhkeys.so.1 B.after the line containing pam_authtok_check.so.1 C. after the line containing […]

Read More

What happened?

Refer to the Exhibit. You notice that the following line has been added to /etc/passwd: admin:x:0:0:Administrator:/:/bin/sh You try to determine when this file was changed. You look at the file creation date, but based on that information, the file has not been touched since the system was installed. You look at the BSM logs for […]

Read More

What is the meaning of the message?

User alice begins to log in to a remote server named foo using Solaris Secure Shell. This message is displayed: The authenticity of host foo can’t be established. RSA key fingerprint in md5 is: 04:9f:bd:fc:3d:3e:d2:e7:49:fd:6e:18:4f:9c:26 Are you sure you want to continue connecting(yes/no)? What is the meaning of the message? A.The user alice is being […]

Read More