[Free] 2018(Jan) EnsurePass Testinsides Oracle 1z0-881 Dumps with VCE and PDF 71-80

By | January 25, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-881
100% Free Download! 100% Pass Guaranteed!

Oracle Solaris 10 Security Administrator Certified Expert Exam

Question No: 71 – (Topic 1)

A security administrator has been asked to construct a Solaris Security Toolkit security profile (that is, driver) to enable Solaris Auditing. If the security administrator starts with the secure.driver profile, which Finish script must be added to enable Solaris Auditing?

  1. enable-bsm.fin

  2. install-bsm.fin

  3. enable-auditing.fin

  4. install-auditing.fin

Answer: A

Question No: 72 – (Topic 1)

Which two statements about the digest and mac commands are true? (Choose two.)

  1. The mac command can use the Digital Encryption Standard (DES) in cipher-block chained (CBC) mode. The digest command can NOT.

  2. The mac command uses a distinct class of hash functions called message authentication codes (MACs). MAC functions combine the input file with a key supplied by the user, returning a fixed length digest.

  3. The mac command uses a distinct class of hash functions called MACs. A MAC function combines the input file with a randomly generated salt, and returns a digest.

  4. The digest command requires that the user supply a key. The mac command does NOT. The digest command takes an input file, combines it with the key, and a variable length digest is returned.

Answer: A,B

Question No: 73 – (Topic 1)

The company you work for is leasing zones to customers to run their applications in. You want each customer to be able to run the zoneadm command to start their zone in case of accidental shutdown, and also zlogin so they can access the console of their zone. Which are three reasons why you should NOT create accounts for them in the global zone and grant them the Zone Management profile? (Choose three.)

  1. They will be able to reboot the global zone.

  2. They will be able to reboot other customers#39; zones.

  3. They will be able to log in to other customers#39; zones.

  4. They will be able to see processes in other customers#39; zones.

  5. They will be able to disable auditing in other customers#39; zones.

Answer: B,C,D

Question No: 74 – (Topic 1)

In which location is the signature for a signed binary found?

  1. the ELF header

  2. a trailer attached to the file

  3. stored in a system database

  4. added to the binary at compile time

  5. created and stored in memory at system boot

Answer: A

Question No: 75 – (Topic 1)

Which two tasks can you perform using the Audit facility? (Choose two.)

  1. generate an overview of CPU usage by users

  2. generate an overview of disk space occupied by a particular user

  3. generate an overview of which users recently changed their password

  4. generate an overview of the network bandwith in use by a particular user

  5. generate an overview of all the applications executed by a particular user

Answer: C,E

Question No: 76 – (Topic 1)

To enforce security within your organization, access restrictions to systems must be applied. In particular, restrictions to the telnet protocol must be configured. Which action must be taken to enable TCP wrappers for the telnet protocol?

  1. svcadm tcp_wrappers start

  2. svcadm enable tcp_wrappers

  3. inetadm -m telnet=tcp_wrappers

  4. inetadm -m telnet tcp_wrappers=true

Answer: D

Question No: 77 – (Topic 1)

To improve accountability on a Solaris system, the security administrator decides to configure the root account to be a Solaris role. What are two considerations that the security administrator should understand before making this change? (Choose two.)

  1. Only authorized users will be able to access root.

  2. root will no longer be able to use the su command.

  3. New privileges will need to be assigned to the root role.

  4. Scheduled cron jobs for the root role will no longer run.

  5. root will no longer be able to log in at the system console.

Answer: A,E

Question No: 78 – (Topic 1)

Click the Exhibit button.

Ensurepass 2018 PDF and VCE

The Exhibit shows the contents of a file named rule, and the output of a Basic Audit and Report Tool (BART) command. The purpose of the command is to create a manifest file of the directory /opt/SUNWrtvc, but unfortunately the command did not succeed. What caused the error from BART?

  1. BART creates only manifest files for the entire system.

  2. The -r rule option has to be removed from the command.

  3. The -R /opt option has to be removed from the command.

  4. The subcommand create has to be removed from the command.

Answer: C

Question No: 79 – (Topic 1)

For security reasons, one of the services your department provides has to be run in a separate zone. Which three of the zone#39;s properties can differ from the global zone? (Choose three.)

  1. the zone#39;s IP address

  2. the zone#39;s system time

  3. the zone#39;s domain name

  4. the zone#39;s root password

  5. the zone#39;s kernel patch level

Answer: A,C,D

Question No: 80 – (Topic 1)

A system administrator wants to share NFS file systems to two different sets of systems. Both sets of systems require integrity checks and Kerberos authentication. The second set of systems also requires encryption. What option is open to the system administrator?

  1. Use an NFS server in two different zones, sharing the same data.

  2. Share the same file system with different sec options for both sets of clients.

  3. Share the file system only with NFSv4, because older NFS versions do not support this.

  4. Logically divide the file system into two separate file systems, each shared with different sec options.

Answer: B

100% Ensurepass Free Download!
Download Free Demo:1z0-881 Demo PDF
100% Ensurepass Free Guaranteed!
1z0-881 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.