[Free] 2018(Jan) EnsurePass Testking Oracle 1z0-881 Dumps with VCE and PDF 51-60

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-881
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/1z0-881.html

Oracle Solaris 10 Security Administrator Certified Expert Exam

Question No: 51 – (Topic 1)

Your company has acquired a small company and your task is to set up the first Solaris server in their network. As there is no existing JumpStart environment, you will have to start from scratch. Which metacluster is best suited for initial installation of a strict minimized system?

  1. Entire Distribution (SUNWCall)

  2. Core Software Support (SUNWreq)

  3. End User System Support (SUNWCuser)

  4. Reduced Networking Core System Support (SUNWCrnet)

Answer: D

Question No: 52 DRAG DROP – (Topic 1)

Click the Task button.

The Solaris 10 OS supports a number of password-related security controls, including minimum password length, password aging, password history, password complexity rules, and password dictionary lookup.

Place each password control item next to its appropriate description.

Ensurepass 2018 PDF and VCE

Drag and drop question. Drag the items to the proper locations.

Answer:

Ensurepass 2018 PDF and VCE

Question No: 53 – (Topic 1)

The kernel calculates the effective set of privileges based on three other privilege sets. This calculation begins with the set of privileges inherited from the parent process. The effective set is then further constrained by two other sets of privileges. Which two describe the remaining privilege sets? (Choose two.)

  1. Permitted set – a subset of the inheritable set

  2. Limit set – the ouside limit of privileges available to the process

  3. Basic set – the privileges which define the system security policy

  4. Implicit set – the set of privileges required by a process to function correctly

  5. Disallowed set – the set of privileges specifically witheld in the process owner#39;s profile

Answer: A,B

Question No: 54 DRAG DROP – (Topic 1)

Click the Task button.

Place the RBAC database names on the correct descriptions.

Ensurepass 2018 PDF and VCE

Drag and drop question. Drag the items to the proper locations.

Answer:

Ensurepass 2018 PDF and VCE

Question No: 55 – (Topic 1)

You suspect that the /usr/bin/lsbinary on a system might have been replaced with a quot;Trojan horse.quot; You have been able to determine that the correct MD5 checksum for the real

/usr/bin/ls binary is: md5 (/usr/bin/ls) = b526348afd2d57610dd3635e46602d2a Which standard Solaris command can be used to calculate the MD5 checksum for the /usr/bin/ls file?

  1. md5 /usr/bin/ls

  2. sum -r /usr/bin/ls

  3. sum -a md5 /usr/bin/ls

  4. crypt -a md5 /usr/bin/ls

  5. digest -a md5 /usr/bin/ls

Answer: E

Question No: 56 – (Topic 1)

Which two statements regarding patching are correct? (Choose two.)

  1. A patching strategy should form part of your security policy.

  2. Only security patches should ever be installed on a secure system.

  3. Hardening a system can reduce the time required to apply patches.

  4. Minimizing a system can reduce the time required to apply patches.

  5. All patches should be installed as soon as possible after they are released.

Answer: A,D

Question No: 57 – (Topic 1)

Click the Exhibit button.

Ensurepass 2018 PDF and VCE

What is the significance of the output generated by the jass-check-sum command?

  1. The two files were deleted since the last Solaris Security Toolkit run.

  2. The two files were created since the last Solaris Security Toolkit run.

  3. The two files were modified since the last Solaris Security Toolkit run.

  4. The two files were archived since the last Solaris Security Toolkit run.

Answer: C

Question No: 58 – (Topic 1)

For security reasons, one of the services your department provides has to be run in a separate zone. Which three of the zone#39;s properties can differ from the global zone? (Choose three.)

  1. the zone#39;s IP address

  2. the zone#39;s system time

  3. the zone#39;s domain name

  4. the zone#39;s root password

  5. the zone#39;s kernel patch level

Answer: A,C,D

Question No: 59 – (Topic 1)

Which three are examples of network security mechanisms? (Choose three.)

  1. IPsec

  2. syslog

  3. Kerberos

  4. TCP Wrappers

  5. Network File System

  6. Basic Security Module

  7. Role Based Access Control (RBAC)

Answer: A,C,D

Question No: 60 DRAG DROP – (Topic 1)

Click the Task button.

Place the Solaris facilities below on the feature they provide.

Ensurepass 2018 PDF and VCE

Drag and drop question. Drag the items to the proper locations.

Answer:

Ensurepass 2018 PDF and VCE

100% Ensurepass Free Download!
Download Free Demo:1z0-881 Demo PDF
100% Ensurepass Free Guaranteed!
1z0-881 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.