[Free] 2018(Jan) EnsurePass Testinsides Oracle 1z0-881 Dumps with VCE and PDF 91-100

By | January 25, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-881
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/1z0-881.html

Oracle Solaris 10 Security Administrator Certified Expert Exam

Question No: 91 – (Topic 1)

An application that you are installing needs to be able to run the snoop command, which normally requires root access. Which two Solaris features could you use to allow this application to run without giving it full root access to your system? (Choose two.)

  1. Solaris Zones

  2. Kerberos-enabled snoop

  3. Trusted Extensions snoop

  4. Process Rights Management

  5. Role Based Access Control (RBAC)

Answer: D,E

Question No: 92 – (Topic 1)

Which three are useful tools to monitor the integrity of a system? (Choose three.)

  1. bart

  2. logadm

  3. elfsign

  4. cryptoadm

  5. Solaris Fingerprint Database

Answer: A,C,E

Question No: 93 – (Topic 1)

A startup company suspects that one of its sales people is accessing confidential research and development files, which are kept on a Solaris 10 system, and leaking their contents to the press. Which measure can the system administrator put in place to detect this activity?

  1. Solaris Auditing

  2. Process Accounting

  3. File Access Control Lists

  4. Basic Audit and Report Tool (BART)

  5. Role Based Access Control (RBAC)

Answer: A

Question No: 94 DRAG DROP – (Topic 1)

Click the Task button.

Place each Solaris Security Toolkit parameter with its description.

Ensurepass 2018 PDF and VCE

Drag and drop question. Drag the items to the proper locations.

Answer:

Ensurepass 2018 PDF and VCE

Question No: 95 – (Topic 1)

The Solaris 10 cryptographic framework provides a set of end user commands. One of these new commands allows the encryption and decryption of a file. In encryption, a file named clear_file with this utility gives this error: # encrypt -a 3des -k 3_des.key -i clear_file

-o encrypt_file encrypt: failed to generate a key: CKR_ATTRIBUTE_VALUE_INVALID

What is the cause?

  1. The key length in 3_des.key is wrong.

  2. The file clear_file is too big to be encrypted.

  3. The encryption key can NOT be stored in a file.

  4. The 3des algorithm can NOT be used to encrypt a file.

Answer: A

Question No: 96 – (Topic 1)

During a recent Solaris security assessment, a security administrator found a directory on a local UFS file system that contained the following files: $ ls -@ total 7200 -rwxr— 1 webadm webadm 1048576 Jun 6 15:34 bar -rw–l– 1 webadm webadm 512000 Jun 6

15:35 baz -rw—-@ 1 webadm webadm 2097152 Jun 6 15:34 foo What is the meaning of

the @ symbol associated with file foo?

  1. The file has the sticky bit set.

  2. The file contains extended file attributes.

  3. The file is configured for mandatory locking.

  4. The file has at least one access control list defined.

  5. The file has permissions with an undefined bit state.

Answer: B

Question No: 97 – (Topic 1)

Traditionally, UNIX systems have allowed users to hard-link files of other users. Your company#39;s current policy disallows this, and you need to implement this change. In the Solaris 10 OS, there is a special privilege that controls this particular capability: the file_link_any privilege. Which statement is true?

  1. You can remove the privilege from all users by editing /etc/default/login.

  2. You can remove the privilege from all users by assigning them a profile shell.

  3. You can NOT remove the privilege from the user#39;s privilege sets because it is a basic privilege.

  4. You can remove the privilege from all users by editing /etc/security/policy.conf.

Answer: D

Question No: 98 – (Topic 1)

A security administrator needs to configure a Solaris system to act as a firewall between your company#39;s corporate network and the Internet, using Solaris IP Filter software to control the traffic passing between these two networks. Which is an efficient way to limit the software that can be run on this system?

  1. Use IPsec to limit execution of non-system binaries.

  2. Use the Solaris Security Toolkit and allow it to automatically minimize the system.

  3. Install Solaris using the Entire Distribution Metacluster, and remove any unneeded packages.

  4. Install Solaris using the Reduced Networking Core System Metacluster and add any extra required packages.

Answer: D

Question No: 99 – (Topic 1)

Which statement is true about applying Solaris patches to zones?

  1. Patches are NOT applicable to sparse root zones.

  2. You have to install a patch in each zone using zlogin.

  3. Non-global zone administrators can install patches themselves.

  4. The global zone administrator can only administer patches in the global zone.

  5. When you add a patch to the global zone, it is by default added to all non-global zones.

Answer: E

Topic 2, Volume B

Question No: 100 – (Topic 2)

You want to know when, by whom, and how privileges are used on one of your systems. How can you get that information?

  1. by enabling Solaris Auditing

  2. by using the ppriv command

  3. by creating the file /etc/priv_debug

  4. by adding an audit.debug entry in /etc/syslog.conf

Answer: A

100% Ensurepass Free Download!
Download Free Demo:1z0-881 Demo PDF
100% Ensurepass Free Guaranteed!
1z0-881 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.