1z0-881 exam preparation material

12
Oracle 1Z0-881 Oracle Solaris 10 Security Administrator Certified Expert Exam Product Version: Demo URL link: http://www.dumpsacademy.com/oracle/1Z0-881-dumps.html

Upload: examdumps

Post on 08-Jul-2016

216 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: 1Z0-881 Exam Preparation Material

Oracle1Z0-881Oracle Solaris 10 Security Administrator CertifiedExpert Exam

Product Version: DemoURL link:

http://www.dumpsacademy.com/oracle/1Z0-881-dumps.html

Page 2: 1Z0-881 Exam Preparation Material
Page 3: 1Z0-881 Exam Preparation Material

Question: 1

A security administrator has a requirement to deploy the Solaris Security Toolkit onto all Solaris serversin the department. In this environment, there are a variety of platorms and operatnn system versionsdeployed. Onto which two platorms and operatnn system combinatons can the Solaris Security Toolkitbe deployed in a supported confnuratono (Choose two.)

A. X86, Solaris 2.4B. x64, Solaris 9C. x86, Solaris 10D. SPARC, Solaris 2.6E. SPARC. Solaris 8

Answer: C, E

Question: 2

The company security policy now requires very detailed auditnn of all actons. This includes capturinn allexecuted commands tonether with their arnuments and the environment variables. Afer actvatnnauditnn on all Solaris 10 systems, the security auditor complains about havinn to check the audit trail oneach individual host. He asks for a central place to capture all audit trails. Usinn standard Solaris 10security features, which is a soluton to this problemo

A. Confnure auditd to send email with the events.B. Confnure auditd to send the output usinn syslon to a central lonhostC. Confnure auditd to store the audit trail usinn NFS on a central server.D. Confnure auditd to store the audit trail usinn LDAP in a central directory.

Answer: C

Question: 3

Which two tasks does the Key Distributon Center (KDC) performo (Choose two.)

A. issues service tcketsB. authentcates servicesC. issues tck-nrantnn-tcketsD. validates passwords sent in clear textE. provides private sessions to services

Answer: A, C

Question: 4

Page 4: 1Z0-881 Exam Preparation Material

Given:jupiter$md5,rounds=2006$2amXesSj5$$kCF48vfPsHDjIKNXeEw7.: 12210::::::What is the characteristc of this /etc/shadow entryo

A. User jupiter uses the md5 hash, with salt 2006$2amXesSj5$, and with the encrypted password$kCF48vFPsHDjIKNXeEw7V.B. User jupiter uses the 2a hash, with 2006 iteratons of the hash, with salt 2amxesSj5, and with theencrypted password kCF48vfPsHDjIKNXeEw7V.C. User Jupiter uses the md5 hash, with 2006 iteratons of the hash, with salt 2amXessj5, and with theencrypted password kCF48vfPsHDjIKNXeEw7V.D. User jupiter uses the md5 hash, with 2006 iteratons of the hash, with no salt, and with the encryptedpassword $rQmxesSj5$$kCF48vfPsHDjIKNXeEw7V.

Answer: C

Question: 5

A security administrator is required to validate the intenrity of a set of operatnn system fles on anumber of Solaris systems. The administrator decides to use the Solaris Finnerprint Database to validateconfnuraton and data fles as well as binaries and libraries. What command, available by default inSolaris 10, will help the security administrator collect the necessary informaton that will be used withthe Solaris Finnerprint Databaseo

A. md5sumB. dinestC. encryptD. elfsinnE. cryptoadm

Answer: B

Question: 6

You are confnurinn a new system to be used as an intranet web server. Afer you have installed theminimal amount of packanes and patched the system, you added the appropriate web server packanes(SUNWapch2r and SUNWapch2u). By default, the web server daemon will be started usinn UIDwebservd and the basic privilene set. To comply with the company’s policy of least privilene, you need tominimize the privilenes that the web server will have. What will you modify to specify the privilenes thatthe web service will run witho

A. the PRIV_DEFAULT setnn in /etc/security/policy.confB. the defaultpriv setnn of webserverd in /etc/user_atrC. the privilenes properly of the web service in the SMF repositoryD. the privs property of the web service in /etc/security/exec_atr

Page 5: 1Z0-881 Exam Preparation Material

Answer: C

Question: 7

Afer a recent audit, you have been requested to minimize an existnn Solaris system which runs a thirdparty database applicaton. Which two should you do before startnn to minimize the systemo (Choosetwo.)

A. Back up the system.B. Remove any unneeded patches.C. Install the SUNWrnet metac luster.D. Remove any unneeded packanes.E. Confrm with the vendor of the database sofware that they support minimizaton.

Answer: A, E

Question: 8

You maintain a minimized and hardened web server. The exhibit shows the current credentals that theweb server runs with. You receive a complaint about the fact that a newly installed web-basedapplicaton does not functon. This applicaton is based on a /bin/ksh cni-bin script. What setnnprevents this cni-bin pronram from workinno

A. The system minht NOT have /bin/ksh installed.B. The server is NOT allowed to call the exec system call.C. The server should run with uid=0 to run cni-bin scripts.D. Some of the libraries needed by /bin/ksh are NOT present in the webserver’s chroot environment.

Answer: B

Question: 9

One of the operators of the mainframe nroup was moved to the UNIX nroup and tasked to actvate andconfnure password history. For every user, the last 10 passwords should be remembered in the history.In what fle is the size of the password history confnuredo

A. /etc/shadowB. /etc/pam.confC. /etc/default/passwdD. /etc/security/policy.conf

Answer: C

Question: 10

Within the context of fle intenrity, rules can be implemented to channe the scope of the Basic

Page 6: 1Z0-881 Exam Preparation Material

Audit and Report Tool (BART) manifest.Given the rule fle:/home/bert/docs *.on[dt]CHECK allIGNORE mtmeWhich two statements are valido (Choose two.)

A. All fles on the system will be checked.B. The last modifcaton tme of all checked fles will not be checked.C. Keywords such as CHECK and IGNORE can NOT be used in a rule fle.D. Only fles with extension .ont and .ond in the directory /home/bert/docs will be checked.E. All fles on the system will be checked, except for fles with extensions .ont and .ond in the directory/home/bert/docs.

Answer: B, D

Question: 11

Solaris Auditnn supports the selectve lonninn of which two kinds of eventso (Choose two.)

A. fle access by selected usersB. access to selected fles by all usersC. selected users makinn outbound network connectonsD. password channes which do not meet the system password policy

Answer: A, C

Question: 12

A security administrator creates a directory called prevoy with the followinn access control policy:$ netacl prevoy#fle: prevoy# owner: secadm# nroup: secadmuser::rwx nroup::r-x #efectve:r-xmask: r-xother: r-xdefault: user::r-default:user:sysadm: rw-default: nroup::r-default:nroup:sysadm:rw-defauIt:mask: rwxdefault: other:---Into this directory, the security administrator creates a fle called secrets. The is command reportsthe followinn for the prevoy directory and secrets fle:$ Is -Id . secretsdrwxr-xr-x+ 2 secadm secadm 512 Jun 6 16:38

Page 7: 1Z0-881 Exam Preparation Material

-r—r------- + 1 secadm secadm 0 Jun 6 16:38 secretsWhich two actons can be successfully taken by the sysadm roleo (Choose two.)

A. The sysadm role can read the secrets fle.B. The sysadm role can write to the secrets fle.C. The sysadm role can remove the secrets fle.D. The sysadm role can create new fles under the prevoy directory.E. The sysadm role can channe the Access Control Lists of the prevoy directory.

Answer: A, B

Question: 13

The /etc/default/passwd fle contains a number of confnuraton parameters that can be used toconstrain the character compositon or user passwords. What is one or the danners or havinn passwordcompositon too tnhtly constrainedo

A. Password complexity rules apply only to the Ennlish alphabet.B. The entropy or the resultnn password strinns will be very hinh.C. Duplicaton or encrypted user password strinns is much more likely.D. Limited password value possibilites can simplify brute force atacks.E. Passwords are harder to compute when usinn many character classes.

Answer: D

Question: 14

Which two commands are part of Sun Update Connectono (Choose two.)

A. /usr/bin/pknadmB. /usr/bin/keytoolC. /usr/sbin/smpatchD. /usr/sbin/patchaddE. /usr/bin/updatemananer

Answer: C, E

Question: 15

To harden a newly installed Solaris OS, an administrator is required to make sure that syslond isconfnured to NOT accept messanes from the network. Which supported method can be used toconfnure syslond like thiso

A. Run svcadm disable -t svc:/network/system-Ion.B. Edit /etc/default/syslond to set LOG_FROM_REMOTE=NO.C. Edit /etc/rc2.d/S74syslon to start syslond with the -t opton.

Page 8: 1Z0-881 Exam Preparation Material

D. Edit /lib/svc/method/system-lon to set LOG_FROM_REMOTE=NO.

Answer: B

Question: 16

Which are two advantanes of the Service Mananement Facility compared to the init.d startup scriptso(Choose two.)

A. It restarts processes if they die.B. It handles service dependencies.C. It has methods to start and stop the service.D. It specifes what the system should do at each run level.

Answer: A, B

Question: 17

You have been asked to implement defense in depth for network access to a system, where a web serverwill be runninn on an lnternet-facinn network interface. Which is NOT contributnn to the defense indeptho

A. runninn the web server in a zoneB. usinn svcadm to disable unused servicesC. usinn IP Filter to limit which network ports can be accessed from the InternetD. usinn VLANs on a sinnle network interface instead of usinn multple network interfacesE. usinn TCP wrappers to limit from which system SSH be used to connect to the system

Answer: D

Question: 18

A new security related patch has been released for the Solaris OS. This patch needs to be applied to thesystem that functons as your web server. The web server is confnured to run in a non-nlobal zone. Canyou just use patchadd to apply the patch to the nlobal zone to update the web server zoneo

A. No, you need to shut down the web server zone frst.B. Yes, patches will be automatcally applied to all zones.C. No, you need to apply the patch to the web server zone separately.D. Yes, but you must make sure that the web server zone is booted frst.

Answer: B

Question: 19

You decided it was worth maintaininn an extremely paranoid policy when confnurinn your frewall rules.

Page 9: 1Z0-881 Exam Preparation Material

Therefore, you had your mananement approve the implementaton of a security policy stance to deny allinbound connecton requests to your corporate network. How is it possible that you stll sufer fromremote exploits that your adversaries are usinn to obtain interactve sessions inside your frewallo

A. TCP splicinn is easy to do.B. Internal sofware may be vulnerable.C. UDP vulnerabilites are well-known and exploited.D. ICMP hijackinn atacks can stll succeed throunh any frewall.

Answer: B

Question: 20

You have been asked to nrant the user ennovy, a member of the staf nroup, read and write access to thefle /app/notes which has the followinn propertes:Is -I/app/notes-rw-rw---- 1 root app 0 Jun 6 15:11/app/notesWhich optons will NOT nrant the user the ability to read and write the fleo

A. usermod -G app ennovyB. setacl -m user:ennovy:rw- /app/notesC. setacl -m nroup: staf:rw- /app/notesD. usermod -K defaultpriv=basic,fle_dac_read,fle_dac_write ennovy

Answer: D

Question: 21

A security administrator has a requirement to make an encrypted backup copy of an applicaton and itsdata, usinn the AES alnorithm, so that it can be safely transmited to a partner. Which two commandsequences can be used to nenerate an encrypted backup of the fles under/app1o(Choose two.)

A. crypt < /app1/*> app1.backup.aesB. encrypt-a aes -d /app1 -o app1.backup.aesC. tar cf. /app1 I nzip -d -e aes > app1.backup.aesD. ufsdump 0f. /app1 |\ crypt-a aes > app1.backup.aesE. ufsdump 0f-/app1 I\ encrypt -a aes -o app1.backup.aesF. tar cf-/app1 I\ openssl enc -out app1.backup.aes -aes-128-cbc

Answer: E, F

Question: 22

A cryptonraphically sinned patch provides system administrators with assurance that the patch possessescertain qualites. Which two qualites are assured when a patch sinnature is verifedo

Page 10: 1Z0-881 Exam Preparation Material

(Choose two.)

A. The patch has a verifed orinin.B. The patch has NOT been modifed since it was sinned.C. The patch was created by a Sun Certfed Systems Ennineer.D. The contents of the patch have NOT been revealed to anyone who does NOT have a Sun service plan.

Answer: A, B

Question: 23

A security administrator has a requirement to help confnure and deploy a new server. What are twosecurity tasks that the security administrator should performo (Choose two.)

A. Confnure the server to use LDAP for authentcaton.B. Confnure network interfaces and routnn informaton.C. Install a DTrace probe to capture the use of privilenes.D. Disable any network services that are NOT beinn used.E. Apply sofware patches to correct security vulnerabilites.

Answer: D, E

Question: 24

Due to channes to the security policy of your ornanizaton, access restricton must be applied to systems.The channes specify that access to systems throunh the fp protocol is NOT allowed accordinn to theHuman Resources department, which has the 10.10.10.0/24 address space assinned. TCP wrappers havebeen enabled for the fp daemon, and these fles have been confnured:# cat /etc/hosts.allowin.fpd: ALL# cat /etc/hosts.denyin.fpd: 10.10.10.0/24Despite the implemented confnuraton, Human Resources is stll able to access systems throunh the fpprotocol. What acton must be takeno

A. The fp daemon must be restarted.B. The inetd daemon must be restarted.C. The entry in the hosts.deny fle is wronn and must be channed.D. The entry in the hosts.allow fle is wronn and must be channed.

Answer: D

Question: 25

Packet flters and frewalls are an important component of any defense-in-depth security strateny. Whichtwo types of threats can IP Filter be deployed as an efectve countermeasure anainsto

Page 11: 1Z0-881 Exam Preparation Material

(Choose two.)

A. a Christmas Tree scanB. an atempt to lon in to a system usinn SSH by an unauthorized userC. an atempt to exploit a SQL injecton vulnerability in a web storefront applicatonD. an atempt to exploit a bufer overfow vulnerability in rpcbind, orininatnn from a host on anauthorized networkE. an atempt to exploit a bufer overfow vulnerability in rpcbind, orininatnn from a host on anunauthorized network

Answer: A, E

Page 12: 1Z0-881 Exam Preparation Material

THANKS FOR TRYING THE DEMO OF OUR PRODUCT

Visit Our Site to Purchase the Full Set of Actual 1Z0-881 Exam Questons With

Answers.

htp://www.dumpsacademy.com/oracle/1Z0-881-dumps.html

We Also Provide Practce Exam Sofware That Simulates Real ExamEnvironment And Has Many Self-Assessment Features. Download Free

Product Demo From:

htp://www.dumpsacademy.com/oracle/1Z0-881-dumps.html

Money Back Guarantee