[Free] 2018(Jan) EnsurePass Testinsides Oracle 1z0-881 Dumps with VCE and PDF 31-40

By | January 25, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-881
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/1z0-881.html

Oracle Solaris 10 Security Administrator Certified Expert Exam

Question No: 31 – (Topic 1)

Which two components are part of the Solaris Cryptographic Framework? (Choose two.)

  1. single sign-on capabilities

  2. encryption and decryption

  3. random number generation

  4. Kerberos principle generation

Answer: B,C

Question No: 32 – (Topic 1)

The Solaris 10 cryptographic framework provides user-level commands to encrypt files. A combination of commands is reported below: # tar cvf – /data | encrypt -a arcfour -k

/tmp/key -o /tmp/backup Which two statements are true? (Choose two.)

  1. The key can NOT be a file.

  2. The backup will be an encrypted file.

  3. arcfour is NOT a valid encryption algorithm.

  4. The tar command invocation is NOT correct.

  5. The /data directory is backed up and encrypted.

Answer: B,E

Question No: 33 – (Topic 1)

The security administrator wants to log all changes that are made to the device policy. Which Solaris 10 subsystem will be used to log changes to the device policy?

  1. syslog facility

  2. Fault Manager

  3. Solaris Auditing

  4. System Event facility

Answer: C

Question No: 34 – (Topic 1)

A system administrator is new to the Solaris cryptographic framework. During minimization and hardening, the system administrator discovered a running /usr/lib/crypto/kcfd and disabled this daemon. To verify the integrity of a Solaris binary, the system administrator is comparing the MD5 checksum of a binary with the information from the Solaris Fingerprint Database at SunSolve. To get the local checksum, he is using the command digest. What will happen when executing this command?

  1. The command will fail with an error.

  2. The command will run as usual and provide the MD5 sum.

  3. The command will run but won#39;t be able to use any installed crypto accelerator hardware (if installed).

  4. The command will run slower because the kernel function can#39;t be accessed, and the userland implementation (libmd5.so.1) will be used.

Answer: A

Question No: 35 – (Topic 1)

In which Solaris OS subsystem is User Rights Management implemented?

  1. Process Privileges

  2. Mandatory Access Control

  3. Service Management Facility

  4. Discretionary Access Control

  5. Role Based Access Control (RBAC)

Answer: E

Question No: 36 – (Topic 1)

It is corporate practice to use the Solaris Security Toolkit on all Sun systems. This has been sucessfully done for years, and the administrators are experienced with the tool. Starting with Solaris 10, the company now also uses Solaris zones. Which two statements regarding Solaris Security Toolkit are correct? (Choose two.)

  1. All minimization and hardening is done from the global zone.

  2. The Solaris Security Toolkit should be run in the non-global zone after installation.

  3. Configuration of the global zone does not impact hardening of the non-global zone.

  4. Hardening and auditing with the Solaris Security Toolkit can be done within each individual zone.

Answer: B,D

Question No: 37 – (Topic 1)

In which two ways can a service administrator specify the privilege set of a particular service in the Service Management Facility? (Choose two.)

  1. Set this using the svcs command.

  2. Import an updated service manifest.

  3. Modify the privilege set using svccfg.

  4. Change the privilege set by using svcprop.

Answer: B,C

Question No: 38 – (Topic 1)

Click the Exhibit button.

Ensurepass 2018 PDF and VCE

To implement dictionary checks at password-change time, your company has acquired a PAM module that performs these checks. Which two locations would put this module in the PAM stack when you install this module as an additional strength checking measure? (Choose two.)

  1. before the line containing pam_dhkeys.so.1

  2. after the line containing pam_authtok_check.so.1

  3. after the line containing pam_authtok_store.so.1

  4. before the line containing pam_authtok_check.so.1

  5. replace the line containing pam_authtok_check.so.1

Answer: B,D

Question No: 39 – (Topic 1)

On a system with these settings in audit_control: dir:/var/audit flags:lo,ex,nt naflags:na minfree:20 Which will NOT be a factor in the size of the audit trail generated by the system?

  1. the audit policy settings

  2. the number of active users

  3. the settings in audit_user

  4. the settings in audit_event

  5. the amount of memory in the system

Answer: E

Question No: 40 – (Topic 1)

The security administrator has created a Basic Audit and Report Tool (BART) control manifest for the /etc directory. A test manifest is created about one hour later, and the two manifests are compared. The administrator checks all attributes for the files in /etc. Which event will NOT be reported by comparing the two manifests with BART?

  1. A file link was removed.

  2. A file was added to the directory.

  3. Permissions on a file were changed.

  4. Permissions on a file were changed and then restored.

  5. A file was examined using vi, edited, restored to original, and saved.

Answer: D

100% Ensurepass Free Download!
Download Free Demo:1z0-881 Demo PDF
100% Ensurepass Free Guaranteed!
1z0-881 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.