[Free] 2018(Jan) EnsurePass Testinsides Oracle 1z0-881 Dumps with VCE and PDF 131-140

By | January 25, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-881
100% Free Download! 100% Pass Guaranteed!

Oracle Solaris 10 Security Administrator Certified Expert Exam

Question No: 131 – (Topic 2)

Which two statements about the digest and mac commands are true? (Choose two.)

  1. The mac command can use the Digital Encryption Standard (DES) in cipher-block chained (CBC) mode. The digest command can NOT.

  2. The mac command uses a distinct class of hash functions called message authentication codes (MACs). MAC functions combine the input file with a key supplied by the user, returning a fixed length digest.

  3. The mac command uses a distinct class of hash functions called MACs. A MAC function combines the input file with a randomly generated salt, and returns a digest.

  4. The digest command requires that the user supply a key. The mac command does NOT. The digest command takes an input file, combines it with the key, and a variable length digest is returned.

Answer: A,B

Question No: 132 – (Topic 2)

Which two tasks can you perform using the Audit facility? (Choose two.)

  1. generate an overview of CPU usage by users

  2. generate an overview of disk space occupied by a particular user

  3. generate an overview of which users recently changed their password

  4. generate an overview of the network bandwith in use by a particular user

  5. generate an overview of all the applications executed by a particular user

Answer: C,E

Question No: 133 – (Topic 2)

Due to a new application requirement, on a Solaris 10 system, the ordinary user admin has to create directories on the root file system. The superuser has given a rights profile to the admin user as shown below: # grep admin /etc/user_attr admin::::type=normal;profiles=File System Management Which command should the user admin execute to create the /log directory on the root file system?

  1. sh mkdir /log

  2. exec mkdir /log

  3. pfsh mkdir /log

  4. pfexec mkdir /log

Answer: D

Question No: 134 – (Topic 2)

An administrator has applied patch 120543-02 to a server. Unfortunately, this patch is causing compatibility problems with one of the core applications running on that server. The patch needs to be backed out to solve the application problems. Which command performs the uninstallation of this patch?

A. pkgrm 120543-02

  1. patchadm -d 120543-02

  2. patchremove 120543-02

  3. smpatch remove -i 120543-02

  4. rm -rf /var/sadm/patch/120543-02

Answer: D

Question No: 135 – (Topic 2)

You have been asked to implement defense in depth for network access to a system, where a web server will be running on an Internet-facing network interface. Which is NOT

contributing to the defense in depth?

  1. running the web server in a zone

  2. using svcadm to disable unused services

  3. using IP Filter to limit which network ports can be accessed from the Internet

  4. using VLANs on a single network interface instead of using multiple network interfaces

  5. using TCP wrappers to limit from which system SSH be used to connect to the system

Answer: D

Question No: 136 – (Topic 2)

To comply with new security guidelines, your company requires you to implement a new password policy that performs stricter checks on new passwords than those performed by Solaris. Which Solaris subsystem can you consider extending?

  1. Solaris PAM

  2. Solaris /usr/bin/passwd

  3. Solaris User Rights Management

  4. Solaris Cryptographic Framework

Answer: A

Question No: 137 – (Topic 2)

User saturn runs a program that consumes all of the system#39;s memory while continuously spawning a new program. You decide to terminate all of saturn#39;s programs to put a stop to this. What command should you use?

  1. kill -u saturn

  2. pkill -U saturn

  3. pstop -U saturn

  4. kill `ps -U saturn -o pid`

Answer: B

Question No: 138 – (Topic 2)

Given: $ ppriv -s I-proc_exec $$ What is the result of this command?

  1. The shell process can no longer execute programs

  2. New commands started by the shell can no longer execute programs.

  3. The command fails because an ordinary user cannot execute this command.

  4. There is no noticible effect because the Inheritable set is NOT used by a process.

Answer: B

Question No: 139 – (Topic 2)

Traditionally, UNIX systems have allowed users to hard-link files of other users. Your company#39;s current policy disallows this, and you need to implement this change. In the Solaris 10 OS, there is a special privilege that controls this particular capability: the file_link_any privilege. Which statement is true?

  1. You can remove the privilege from all users by editing /etc/default/login.

  2. You can remove the privilege from all users by assigning them a profile shell.

  3. You can NOT remove the privilege from the user#39;s privilege sets because it is a basic privilege.

  4. You can remove the privilege from all users by editing /etc/security/policy.conf.

Answer: D

Question No: 140 – (Topic 2)

An Internet service provider is offering shell accounts on their systems. As a special service, customers can also apply for a root account to get their own virtual machine. The provider has implemented this by using zones, and the customers get root access to the non-global zone. One of their customers is developing cryptographic software and is using the ISP machine for testing newly developed Solaris crypto providers. What kind of testing is available to this developer?

  1. The developer is able to test newly developed user-level providers.

  2. The developer is able to test newly developed kernel software providers.

  3. The developer can NOT test newly developed providers in a non-global zone.

  4. The developer is able to do the same tests as if developing as root in the global zone.

Answer: A

100% Ensurepass Free Download!
Download Free Demo:1z0-881 Demo PDF
100% Ensurepass Free Guaranteed!
1z0-881 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.