[Free] 2018(Jan) EnsurePass Testinsides Oracle 1z0-881 Dumps with VCE and PDF 161-170

By | January 25, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-881
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/1z0-881.html

Oracle Solaris 10 Security Administrator Certified Expert Exam

Question No: 161 – (Topic 2)

A web server administrator must configure an Apache 2 web server to start as the user webservd. The web server administrator has been assigned the quot;Service Operatorquot; rights profile. While attempting to set the SMF service property start/user, the web server administrator receives the following error message:

$ /usr/sbin/svccfg -s svc:/network/http:apache2 svc:/network/http:apache2gt; setprop start/user = astring: webservd Permission Denied. Why does this error occur?

  1. The Apache 2 web server must be started only as root.

  2. Only the superuser is permitted to change SMF property values.

  3. The administrator needs the solaris.smf.manage authorization.

  4. The start/user property does NOT exist for the Apache 2 service.

Answer: C

Question No: 162 DRAG DROP – (Topic 2)

Click the Task button.

Place the cryptographic providers next to the correct class functions.

Ensurepass 2018 PDF and VCE

Drag and drop question. Drag the items to the proper locations.

Answer:

Ensurepass 2018 PDF and VCE

Question No: 163 – (Topic 2)

A site security policy dictates that all failed logins to critical systems must be logged and monitored. Which parameter must be changed in /etc/default/login to enable this functionality?

  1. SYSLOG

  2. LOG_LOGIN_FAILURES

  3. SYSLOG_LOG_FAILURES

  4. LOG_SYSLOG_FAILURES

  5. SYSLOG_FAILED_LOGINS

Answer: E

Question No: 164 DRAG DROP – (Topic 2)

Click the Task button.

There are a number of security tasks that a typical security administrator performs when configuring and deploying new servers.

Place the security task next to its description.

Ensurepass 2018 PDF and VCE

Drag and drop question. Drag the items to the proper locations.

Answer:

Ensurepass 2018 PDF and VCE

Question No: 165 – (Topic 2)

Click the Exhibit button.

Ensurepass 2018 PDF and VCE

What is the significance of the output generated by the jass-check-sum command?

  1. The two files were deleted since the last Solaris Security Toolkit run.

  2. The two files were created since the last Solaris Security Toolkit run.

  3. The two files were modified since the last Solaris Security Toolkit run.

  4. The two files were archived since the last Solaris Security Toolkit run.

Answer: C

Question No: 166 – (Topic 2)

A user started the ssh-agent followed by the ssh-add command.

Afterwards the user connects to a remote system by using the ssh command. What will this ssh command do?

  1. It requires the user to enter their pass-phrase.

  2. It generates new keys from the user#39;s pass-phrase.

  3. It allows the user to authenticate through the GSS-API.

  4. It authenticates without asking for the user#39;s pass-phrase.

Answer: D

Question No: 167 – (Topic 2)

Click the Exhibit button.

Ensurepass 2018 PDF and VCE

Based on this output from verifying a signed patch, which statement is correct?

  1. The patch is correctly signed.

  2. The patch signature manifest is invalid.

  3. The patch signature hash was NOT supplied.

  4. The patch signature is invalid, because NOT all files are signed.

Answer: A

Question No: 168 – (Topic 2)

A small newspaper company has problems, because one of their servers was modified by someone. Before this incident, they didn#39;t bother about security. After a new installation, they now want to restrict access to the system. Which two options will enhance their access control? (Choose two.)

  1. Disable services without authentication.

  2. Enable auditing for login and logout activities.

  3. Use Role Based Access Control (RBAC) for administrative tasks.

  4. Create a wheel group and list the admin accounts in this group to limit the su command

to only those people.

Answer: A,C

Question No: 169 – (Topic 2)

The Key Distribution Center (KDC) is a central part of the Kerberos authentication system. How should the system running the KDC be configured?

  1. It should be a hardened, minimized system.

  2. It should be a hardened, non-networked system.

  3. The KDC implementation employs cryptography and can therefore run securely on an ordinary multi-user system.

  4. For improved security, users must log in to the KDC before authenticating themselves, so it must be a multiuser system.

Answer: A

Question No: 170 – (Topic 2)

A user needs to be able to mount the file system located on a USB memory stick on a workstation. How can you allow the user to mount and unmount this file system when required?

  1. Give the user write access to /etc/vfstab.

  2. Give the user write access to /etc/mnttab.

  3. Assign the user the sys_mount privilege for the file system.

  4. Enable and configure the automount daemon (automountd).

  5. Enable and configure the volume management daemon (vold).

Answer: E

100% Ensurepass Free Download!
Download Free Demo:1z0-881 Demo PDF
100% Ensurepass Free Guaranteed!
1z0-881 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.