[Free] 2018(Jan) EnsurePass Testinsides Oracle 1z0-881 Dumps with VCE and PDF 151-160

By | January 25, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-881
100% Free Download! 100% Pass Guaranteed!

Oracle Solaris 10 Security Administrator Certified Expert Exam

Question No: 151 – (Topic 2)

As part of the normal deployment process, a security administrator is required to verify the security configuration of a new Solaris 10 zone before it can be put into production. Using the Solaris Security Toolkit, the security administrator will verify the zone#39;s configuration against the corporate baseline, baseline.driver. Which command line will the security administrator use to verify the zone named yennov?

  1. jass-execute -z yennov -a baseline.driver

  2. zlogin yennov jass-execute -a baseline.driver

  3. jass-execute -R /export/yennov/root -a baseline.driver

  4. chroot /export/yennov/root jass-execute -a baseline.driver

Answer: B

Question No: 152 – (Topic 2)

A system is configured to automatically lock accounts after a number of failed login attempts. This was done by enabling the feature globally (LOCK_AFTER_RETRIES=YES) without any further changes. Is the root user also affected by the account locking?

  1. By default, root is excluded from automatic account locking.

  2. root can always log in on the console, whether it is locked or not.

  3. The framework ensures that root can never be automatically locked.

  4. The /etc/shadow entry for the root user has the value -1 for failed login attempts, which causes this account to never be locked.

Answer: A

Question No: 153 – (Topic 2)

Which two steps have to be performed to configure systems so that they are more resilient to attack? (Choose two.)

  1. Perform system auditing.

  2. Perform system hardening.

  3. Perform system replication.

  4. Perform a full system backup.

  5. Perform system minimization.

Answer: B,E

Question No: 154 – (Topic 2)

The security group is testing software in a special lab which is configured in the same secure way as the production servers. Some of the tested code might even be malicious. Due to budget restrictions, the available lab systems for these tests have been reduced to only three remaining systems. The system administrator is responsible for quickly reinstalling these systems over and over again. What way is most efficient to reliably accomplish this task?

  1. Use compressed flash archives.

  2. Use UFS snapshots and rollback as needed.

  3. Use a checklist for installation with local media.

  4. Use JumpStart with the Solaris Security Toolkit (SST).

Answer: A

Question No: 155 – (Topic 2)

Which two components are part of the Solaris Cryptographic Framework? (Choose two.)

  1. single sign-on capabilities

  2. encryption and decryption

  3. random number generation

  4. Kerberos principle generation

Answer: B,C

Question No: 156 – (Topic 2)

A security administrator is asked to create digests of some important files on a server. The

digests must be stored locally on the same server. Which command will allow the administrator to create digests and assure that the digests have NOT been tampered with?

  1. mac

  2. digest

  3. elfsign

  4. cryptoadm

Answer: A

Question No: 157 – (Topic 2)

Which prints out all world-writable files?

  1. find / -perm -a=w -print

  2. find / -perm -o=w -print

  3. find / -perm -u=w -print

  4. find / -perm -a=777 -print

Answer: B

Question No: 158 – (Topic 2)

A security administrator has created these quot;Restricted Commandsquot; rights profiles in the

/etc/security/exec_attr file that will be assigned to a number of application developers: $ grep quot;^Restricted Commandsquot; /etc/security/exec_attr Restricted Commands:solaris:cmd:::/my/bin/progA:uid=yadm;gid=yadm Restricted Commands:

solaris:cmd:::/my/bin/progB:uid=vadm;gid=vadm Restricted Commands:solaris:cmd:::/my/bin/progC:uid=oamd;

gid=aadm Restricted Commands:solaris:cmd:::/my/bin/progD:uid=nadm;gid=badm Restricted Commands:

solaris:cmd:::/my/bin/progD:uid=nadm;gid=cadm Restricted Commands:solaris:cmd:::/my/bin/progD:uid=eadm;

gid=eadm Restricted Commands:solaris:cmd:::/my/bin/progD: As what UID and GID will the command /my/bin/progD run when the command is executed as followed by an

application developer who has been assigned the quot;Restricted Commandsquot; rights profile?

  1. UID nadm and GID badm

  2. UID nadm and GID cadm

  3. UID eadm and GID eadm

  4. UID and GID of the application developer

Answer: A

Question No: 159 – (Topic 2)

A user tries to log in to a system using ssh and receives this message: The authenticity of host #39;example-01 (; can#39;t be established. RSA key fingerprint is 00:11:22:33:44:55:66:77:88:99:aa:bb:cc:dd:ee:ff. Are you sure you want to continue (yes/no)? Why is this message being generated?

  1. The user has never logged into example-01.

  2. The ssh-agent command is not running on the client machine.

  3. The user has entered an invalid password when trying to log into example-01.

  4. example-01 has changed its host key since the last time the user has logged into the system.

Answer: A

Question No: 160 – (Topic 2)

Which two commands are part of Sun Update Connection? (Choose two.)

  1. /usr/bin/pkgadm

  2. /usr/bin/keytool

  3. /usr/sbin/smpatch

  4. /usr/sbin/patchadd

  5. /usr/bin/updatemanager

Answer: C,E

100% Ensurepass Free Download!
Download Free Demo:1z0-881 Demo PDF
100% Ensurepass Free Guaranteed!
1z0-881 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.