[Free] 2018(Jan) EnsurePass Testking Oracle 1z0-881 Dumps with VCE and PDF 121-130

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-881
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/1z0-881.html

Oracle Solaris 10 Security Administrator Certified Expert Exam

Question No: 121 – (Topic 2)

An application file system stores unchanging data only. How should this file system be mounted defensively in /etc/vfstab?

  1. /dev/dsk/c0t3d0s6 /dev/rdsk/c0t3d0s6 /data ufs 2 yes ro,nosuid,anon=0

  2. /dev/dsk/c0t3d0s6 /dev/rdsk/c0t3d0s6 /data ufs 2 yes nodevices,noexec,ro

  3. /dev/dsk/c0t3d0s6 /dev/rdsk/c0t3d0s6 /data ufs 2 yes nosuid,noxattr,noexec

  4. /dev/dsk/c0t3d0s6 /dev/rdsk/c0t3d0s6 /data ufs 2 yes noexec,nosuid,nodevices

Answer: B

Question No: 122 – (Topic 2)

An NFSv4 client has a user jupiter from domain example.com. The NFS server is in the ficticious.com domain and knows the user as jupiter as well. How would the server treat requests made by the client?

  1. The server accepts the requests by the client as jupiter.

  2. The server rejects a subset of the requests made by the client.

  3. The server would reject all remote procedure call (RPC) requests.

  4. The server would map the user to nobody and accepts its requests.

Answer: D

Question No: 123 – (Topic 2)

Given: jupiter:$md5,rounds=2006$2amXesSj5$$kCF48vfPsHDjlKNXeEw7V.:12210:::::: What is the characteristic of this /etc/shadow entry?

  1. User jupiter uses the md5 hash, with salt 2006$2amXesSj5$, and with the encrypted password $kCF48vfPsHDjlKNXeEw7V.

  2. User jupiter uses the 2a hash, with 2006 iterations of the hash, with salt 2amXesSj5,

    and with the encrypted password kCF48vfPsHDjlKNXeEw7V.

  3. User jupiter uses the md5 hash, with 2006 iterations of the hash, with salt 2amXesSj5, and with the encrypted password kCF48vfPsHDjlKNXeEw7V.

  4. User jupiter uses the md5 hash, with 2006 iterations of the hash, with no salt, and with the encrypted password $rQmXesSj5$$kCF48vfPsHDjlKNXeEw7V.

Answer: C

Question No: 124 – (Topic 2)

A user that you are investigating is logged in on a system with auditing enabled. The user is running vi, and you need to log which files the user is accessing. Unfortunately, the fr class is not audited, so you want to explicitly alter the audit pre-selection mask for this vi process. Which command allows you to do that?

  1. audit

  2. svccfg

  3. bsmconv

  4. auditconfig

Answer: D

Question No: 125 – (Topic 2)

Click the Exhibit button.

Ensurepass 2018 PDF and VCE

Given a fresh new installation of a Solaris 10 system from a genuine DVD media kit, the output of the command shown in the Exhibit fails to verify the /bin/bart elf binary file.

Assuming that the binary file is genuine, what is incorrect with the command?

  1. The certificate is expired.

  2. The path of the certificate is NOT correct.

  3. The key word verify is in the wrong place.

  4. None of the elf binary files in Solaris 10 are signed.

  5. The command given does NOT verify, but instead signs elf binary files.

Answer: B

Question No: 126 – (Topic 2)

During the installation of your database server db, you disabled telnet access to it by running inetadm -d telnet, because your company security policy prohibits unencrypted access to the systems. You also added a default deny access policy:

# cat /etc/hosts.deny ALL: ALL Now a legacy application running on the legacy server needs access to the db server, using telnet, and you have been asked to implement the changes. Which three steps do you have to take to enable telnet on db and restrict access to it, so that only traffic from legacy is allowed? (Choose three.)

  1. inetadm -e telnet

  2. svcadm enable telnet

  3. inetadm -M tcp_wrapper=TRUE

  4. inetadm -m telnet tcp_wrapper=TRUE

  5. inetadm -m telnet tcp_wrapper=legacy

  6. Add in.telnetd:legacy to /etc/hosts.deny.

  7. Add in.telnetd: legacy to /etc/hosts.allow.

  8. svcprop -s telnet setprop inetd/tcp_wrappers=TRUE

Answer: A,D,G

Question No: 127 – (Topic 2)

Solaris 10 includes the ability to lock a user#39;s account after a fixed number of failed login accounts. What is the disadvantage of enabling this feature?

  1. Only login attempts using telnet are counted.

  2. It can be used to enable a Denial-of-Service attack.

  3. Entering a blank password will reset the failed login count.

  4. It requires passwords to be stored in clear-text on the system.

Answer: B

Question No: 128 – (Topic 2)

Your company has acquired a small company and your task is to set up the first Solaris server in their network. As there is no existing JumpStart environment, you will have to start from scratch. Which metacluster is best suited for initial installation of a strict minimized system?

  1. Entire Distribution (SUNWCall)

  2. Core Software Support (SUNWreq)

  3. End User System Support (SUNWCuser)

  4. Reduced Networking Core System Support (SUNWCrnet)

Answer: D

Question No: 129 – (Topic 2)

What type of condition does Basic Audit and Report Tool (BART) allow you to detect?

  1. unauthorized attempts to log in to a system

  2. when a file has been modified, compared with a known baseline

  3. a dictionary password attack, executed by attempting to log in through SSH

  4. when a user attempts to assume a role which has NOT been assigned to that user

  5. when users have chosen passwords which do NOT comply with system password policy

Answer: B

Question No: 130 – (Topic 2)

A system administrator at home wants secure communication with the company#39;s network through a VPN. Which step would accomplish this?

  1. Use ssh with port forwarding.

  2. Configure IP Filter on the client.

  3. Configure IPsec in tunnel mode.

  4. Configure IPsec in transport mode.

Answer: C

100% Ensurepass Free Download!
Download Free Demo:1z0-881 Demo PDF
100% Ensurepass Free Guaranteed!
1z0-881 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.