[Free] 2018(Jan) EnsurePass Testinsides Oracle 1z0-881 Dumps with VCE and PDF 111-120

By | January 25, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-881
100% Free Download! 100% Pass Guaranteed!

Oracle Solaris 10 Security Administrator Certified Expert Exam

Question No: 111 – (Topic 2)

What is the purpose of the Solaris cryptographic framework metaslot?

  1. It is a storage facility for all of the encryption algorithms.

  2. It is a pointer to the next available cryptographic token slot.

  3. It is a library to limit algorithms based on export control laws.

  4. It is a door-based interface to the kernel cryptographic services.

  5. It is an interface to connect to any available cryptographic service.

Answer: E

Question No: 112 – (Topic 2)

You have taken over administration of a web server which is connected to the Internet. The server was installed using a minimized installation of Solaris, and has been hardened using the Solaris Security Toolkit. Which statement is correct?

  1. smpatch can be used to apply relevant patches.

  2. Solaris Security Toolkit will apply new patches as required.

  3. Only the kernel patch is required, because it has been minimized.

  4. Regular patching of the system is NOT required, because it has been hardened.

Answer: A

Question No: 113 DRAG DROP – (Topic 2)

Click the Task button.

Place each Kerberos concept next to the correct definition.

Ensurepass 2018 PDF and VCE

Drag and drop question. Drag the items to the proper locations.


Ensurepass 2018 PDF and VCE

Question No: 114 – (Topic 2)

You have been asked to grant the user ennovy, a member of the staff group, readand write access to the file /app/notes which has the following properties: ls -l /app/notes -rw-rw 1

root app 0 Jun 6 15:11 /app/notes Which options will NOT grant the user the ability to read and write the file?

  1. usermod -G app ennovy

  2. setfacl -m user:ennovy:rw- /app/notes

  3. setfacl -m group:staff:rw- /app/notes

  4. usermod -K defaultpriv=basic,file_dac_read,file_dac_write ennovy

Answer: D

Question No: 115 – (Topic 2)

Which three are examples of network security mechanisms? (Choose three.)

  1. IPsec

  2. syslog

  3. Kerberos

  4. TCP Wrappers

  5. Network File System

  6. Basic Security Module

  7. Role Based Access Control (RBAC)

Answer: A,C,D

Question No: 116 – (Topic 2)

When configuring the Internet Key Exchange (IKE) daemon, which two exchanges can system administrators choose to do? (Choose two.)

  1. shared secret keys

  2. public keying material

  3. public key certiticates

  4. private key certificates

  5. shared key certificates

Answer: A,C

Question No: 117 – (Topic 2)

Given the command reported in /etc/dfs/dfstab from a system export: share -F nfs rw=foo,root=foo,ro /export Who can write to this file system?

  1. all users on system foo

  2. the root user on system foo

  3. the root user on systems foo and ro

  4. all users on systems that have mounted this file system

Answer: A

Question No: 118 – (Topic 2)

Which three items are the most relevant when trying to prevent resource exhaustion attacks? (Choose three.)

  1. pools

  2. zones

  3. groups

  4. signals

  5. projects

  6. resource controls

Answer: A,E,F

Question No: 119 – (Topic 2)

Which two statements are true when applying the Solaris Security Toolkit software to a system with non-global zones installed? (Choose two.)

  1. Some Solaris Security Toolkit scripts are NOT relevant to the non-global zone.

  2. The Solaris Security Toolkit undo option must be executed from the global zone.

  3. Applying Solaris Security Toolkit to a non-global zone has no affect on the global zone.

  4. Running processes in a non-global zone are included in a global zone Solaris Security Toolkit audit run.

  5. Solaris Security Toolkit will automatically configure services in the global zone when applied to the nonglobal zone.

Answer: A,C

Question No: 120 – (Topic 2)

To enforce security within your organization, access restrictions to systems must be applied. In particular, restrictions to the telnet protocol must be configured. Which action must be taken to enable TCP wrappers for the telnet protocol?

  1. svcadm tcp_wrappers start

  2. svcadm enable tcp_wrappers

  3. inetadm -m telnet=tcp_wrappers

  4. inetadm -m telnet tcp_wrappers=true

Answer: D

100% Ensurepass Free Download!
Download Free Demo:1z0-881 Demo PDF
100% Ensurepass Free Guaranteed!
1z0-881 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.