[Free] 2018(Jan) EnsurePass Testinsides Oracle 1z0-878 Dumps with VCE and PDF 211-220

By | January 25, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-878
100% Free Download! 100% Pass Guaranteed!

Oracle Solaris 10 System Administrator Certified Professional Exam, Part II

Question No: 211 – (Topic 2)

The security administrator wishes to create a rights profile which is a superset of another rights profile. Certain commands in the new rights profile are to be run with different attributes to the original profile. How would you implement this using the RBAC framework?

  1. Copy the lines in the /etc/exec_attr file for the original rights profile and assign them to the new rights profile. Modify the attributes as necessary.

  2. Modify the /etc/exec_attr file to use a shell script which checks the rights profile being used and then executes the commands with the appropriate attributes using the pfexec command.

  3. Assign both rights profiles to the appropriate roles and give a higher priority to the commands for the new rights profile when different attributes are required.

  4. Use the profiles keyword when defining the new rights profile in the /etc/prof_attr file to import the original rights profile as part of the new rights profile.

Answer: B

Question No: 212 – (Topic 2)

Your system is newly built and has a default set up. When you add an account using roleadd, what is the default shell?

  1. /usr/bin/sh

  2. /usr/bin/ksh

  3. /usr/bin/pfsh

  4. /usr/bin/prsh

  5. /usr/bin/pfjsh

  6. /usr/bin/prksh

Answer: C

Question No: 213 – (Topic 2)

The security administrator wants to assign user bob to a netsec role so that the user can run the ifconfig and snoop commands with a rights profile named NSM.

Which entries are contained in the /etc/security/exec_attr file after the required RBAC configuration is implemented?

  1. NSM:bob:cmd:::/sbin/ifconfig:uid=0 NSM:bob:cmd:::/usr/sbin/snoop:uid=0

  2. NSM:root:cmd:::/sbin/ifconfig:uid=0 NSM:root:cmd:::/usr/sbin/snoop:uid=0

  3. NSM:suser:cmd:::/sbin/ifconfig:uid=0 NSM:suser:cmd:::/usr/sbin/snoop:uid=0

  4. NSM:netsec:cmd:::/sbin/ifconfig:uid=0 NSM:netsec:cmd:::/usr/sbin/snoop:uid=0

Answer: C

Question No: 214 – (Topic 2)

The system administrator assigned a profile entry with sufficient rights to execute the snoop command. The user reports that it does NOT work. The system administrator wants the command to work automatically for the user. The system administrator verifies that the RBAC database entries are correct.

What are two solutions for this problem? (Choose two.)

  1. The user needs to be assigned a profile shell.

  2. The user should prefix the command line with pfexec.

  3. The user needs to log out and log in again to run with the new shell.

  4. The user needs to execute the su root command before the user can execute any of the profile commands.

Answer: A,C

Question No: 215 – (Topic 2)

Which two commands switch the environment of the current user fred to the role special? (Choose two.)

  1. su special

  2. role special

  3. su -special

  4. usermod -R special

  5. role -s special fred

  6. usermod -R special fred

Answer: A,C

Question No: 216 – (Topic 2)

You are setting up a new help desk technician. The help desk technician is responsible for administering all user privilege aspects. The technician must be able to answer user requests for forgotten passwords and set and change user passwords. The new technician must also be able to read the configuration files related to other users. However, the technician#39;s supervisor must make any changes that are required. The help desk technician will use the login name of helpdesk4. The userid of helpdesk4 has already been created as an unprivileged user. Which two commands add the authority to the helpdesk4 user to change user passwords, but only allow read-only access to user and role configuration files?

(Choose two.)

  1. usermod -A solaris.* helpdesk4

  2. usermod -A solaris.admin.usermgr.read helpdesk4

  3. usermod -A solaris.admin.usermgr.pswd helpdesk4

  4. roleadd -A solaris.admin.usermgr.pswd helpdesk4

  5. roleadd -A solaris.admin.usermgr.read helpdesk4

  6. usermod -A solaris.admin.usermgr.grant helpdesk4

Answer: B,C

Question No: 217 – (Topic 2)

Given the line taken from the syslogd daemon configuration file: mail.debug


What is the result of implementing this entry?

  1. Assuming a remote loghost is configured, the mail.debug messages are logged locally and remotely.

  2. The mail.debug messages are logged locally in the /var/adm/messages file, regardless of any loghost alias.

  3. The mail.debug messages are logged remotely if a remote host is configured in the

    /etc/inet/hosts file.

  4. The mail.debug messages are not logged at all because the /var/adm/messages file is for kernel messages only.

Answer: B

Question No: 218 – (Topic 2)

The director of IT operations wants all important messages and all security related syslog events forwarded to a central system. The IT staff decides that this means that they need to forward all the auth messages and all other messages above the notice level, excluding the user messages to the bigbrother system.

Which line needs to be added to the /etc/syslog.conf file?

  1. auth.*;*.notice;user.crit @bigbrother

  2. auth.debug;*.notice;user.none @bigbrother

  3. auth.debug;*.warning;user.none @bigbrother

  4. *.emerg;*.alert;*.crit;*.warning;auth.* @bigbrother

Answer: B

Question No: 219 – (Topic 2)

On a Solaris 10 OS, you want to enable a syslog message for all incoming inetd requests. What do you need to do?

  1. execute inetadm -M tcp_trace=true

  2. execute inetadm -M tcp_wrappers=true

  3. edit /etc/inetd.conf and add a tcp wrapper to each enabled service

  4. edit /etc/init.d/inetsvc and add the -t option to the inetd invocation

Answer: A

Question No: 220 – (Topic 2)

As part of an early warning system, a system administrator disables the remote shell service and replaces it with a script. This script logs that it was called with the auth facility and the warning level. The script also logs the process ID of the invoking shell.

What is the proper invocation of logger?

  1. logger -i -p auth.warning quot;rsh attempted from $ruser@$host to $userquot;

  2. logger -p warning.auth quot;rsh[$$]: attempted from $ruser@$host to $userquot;

  3. logger -i -p auth.warning -t rsh quot;attempted from $ruser@$host to $userquot;

  4. logger -p auth.warning -t rsh quot;[$$] attempted from $ruser@$host to $userquot;

Answer: C

100% Ensurepass Free Download!
Download Free Demo:1z0-878 Demo PDF
100% Ensurepass Free Guaranteed!
1z0-878 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.