You are on page 1of 14

HowToDealWithTheProblemofPreparationof1Z0881Exam

The preparation can be started once after knowing the syllabus of exam. If you start browsing to find a suitable source to prepare
OracleOracleCertifiedExpertOracleSolaris10SecurityAdministrator1Z0881from,youwillbebombardedwiththousandsof
results.Itthenaddstoyourhardworktolookforthemostauthenticsourcefromthatheap.Tosaveyoufromthistrouble,Iwilltell
youthesourcethatwillgiveyouthemostreliableinformationontheOracleSolaris10SecurityAdministratorCertifiedExpertExam
examyouhavetoattempt.

HavePass4sureTestByYourSide
The website I am talking about is Pass4sureTest and it is the most dependable source of 1Z0881 Oracle Solaris 10 Security
Administrator Certified Expert Exam exam preparation material.This is because it has been in association with Oracle for a long
periodoftimenowandisconsideredasbestoutthere.Inaddition,Pass4sureTestisoneoftheforerunnersofpreparationmovement
andhasbeenhelpingcandidatestogetthroughtheirexamsforstretchoftime.

VerifyReliabilityThroughTestimonials
Youcanverifythereliabilityandrelevancybylookingatthelonglineoftestimonialsstatedbythecustomers.ThePass4sureTest
hassuccessfullyturnedanumberofcustomersintocertifiedOracleprofessionals.ThetestimonialsectionisfullofclaimsbyOracle
Oracle Solaris 10 Security Administrator Certified Expert Exam professionals that willingly guarantee the reliability of
Pass4sureTest.

WhatisSpecialAboutThe1Z0881ExamProduct?
How would you know that the material provided by Pass4sureTest is unique and
incomparable to others? Well this can be confirmed by looking at the material
provided to you. It is in rich PDF format which is easy to read and edit. Moreover,
there is also special software included in the product that allows you to practice the
testbeforetakingexam.

TheFacilityToSet1Z0881Exam
Preferences
With numerous accessibility options provided by the
Pass4sureTest's product, you can change exam
preferences,languagesandotheroptionsaswell.So,do
asyouplease.

SimulationofOracle1Z0881Exam
1Z0881PracticeTestSoftware
The1Z0881practicesoftwareiscreatedbyspecialistswhohavemadesurethatthe
questions in this software cover all the syllabus topics of the Oracle 1Z0881 exam.
Resultantly,youwillgetfullcoverageofthesyllabus.

The practice test software provided in the product


imitates the Oracle Solaris 10 Security Administrator
Certified Expert Exam exam environment and hence,
provides you the opportunity to attempt the real exam
beforeitactuallyhappens.Asaresult,yourconfidence
is driven up and you will enter the examination hall
knowingwhatyouaregoingtofaceinthere.

SAFEANDSECURE
With highly effective tools developed by McAfee and a SSL 64bit
framework,Pass4sureTestgivesyouunbeatablesecurity.

QUALITYISOURGUARANTEE
The material provided by the Pass4sureTest is top quality. Such
quality is achieved by a complete research of the 1Z0881 Oracle
Solaris 10 Security Administrator Certified Expert Exam exam
syllabustocreatethepreparatorymaterial.

HANDYINTERFACE
The product is specially designed by keeping in mind the problems
people have with the tech products. To ensure this Oracle Oracle
Solaris 10 Security Administrator Certified Expert Exam specialists
haveworkedhardandmadeahandyproduct.

MoneyBackGuarantee
Pass4sureTest is very
muchconfidentaboutthe
product it offers and as a
result, it gives each and
every candidate a 90
days'windowtostatehis
failure in Oracle Certified Expert Oracle
Solaris 10 Security Administrator 1Z0881
exam.Ifacandidatebringsforthhisfailure
in 90 days, Pass4sureTest pays the money
back to the candidate. What better
opportunity can there be to make your
investmentriskfree?Formoredetails,visit
thewebsite.

NeverRemainBehindon
Updates
Pass4sureTest knows the
importance of updates in
a
software
related
product. Therefore, it
provides routine updates
for the syllabus, Oracle
1Z0881 exam questions and the software.
These updates can be downloaded free of
cost. To get benefit fully from the product,
youshouldregularlycheckforupdates.

DiscountsAndRewards
Current customers
are enjoying benefits
of cashback offers
whereas
new
promotions
are
launched for the new
customers.Bybuying
the Oracle Oracle Certified Expert Oracle
Solaris 10 Security Administrator 1Z0881
Oracle Solaris 10 Security Administrator
Certified Expert Exam exam package, you
can get a 30% discount. It will remain by
your side during you entire professional
careerandwillkeeponhelpingyou.

TryFreeDemoofOracle1Z0881ExamQuestions
Don'ttrustPass4sureTestbeforetryingthefreedemoofthe1Z0881examproduct.Thiswillenableyoutocheckthequalityaswell.Getthedemofor
OracleCertifiedExpertOracleSolaris10SecurityAdministrator1Z0881examnow,freeofcost.Whenyougetsatisfiedwiththequality,makethe
finalpurchase.Doleaveyourvaluablefeedbackasitisagoodsourceofinsight.

http://www.pass4suretest.com/1Z0881exam.html

Oracle
1Z0-881
Oracle Solaris 10 Security Administrator Certified
Expert Exam

Demo Product
To Buy Full Set of Exam Questions, Visit:
http://www.pass4suretest.com/1Z0-881-exam.html

Question: 1
A security administrator has a requirement to deploy the Solaris Security Toolkit onto all Solaris
servers in the department. In this environment, there are a variety of platorms and operatnn system
versions deployed. Onto which two platorms and operatnn system combinatons can the Solaris
Security Toolkit be deployed in a supported confnuratono (Choose two.)
A. X86, Solaris 2.4
B. x64, Solaris 9
C. x86, Solaris 10
D. SPARC, Solaris 2.6
E. SPARC. Solaris 8

Answer: C, E
Question: 2
The company security policy now requires very detailed auditnn of all actons. This includes
capturinn all executed commands tonether with their arnuments and the environment variables.
Afer actvatnn auditnn on all Solaris 10 systems, the security auditor complains about havinn to
check the audit trail on each individual host. He asks for a central place to capture all audit trails.
Usinn standard Solaris 10 security features, which is a soluton to this problemo
A. Confnure auditd to send email with the events.
B. Confnure auditd to send the output usinn syslon to a central lonhost
C. Confnure auditd to store the audit trail usinn NFS on a central server.
D. Confnure auditd to store the audit trail usinn LDAP in a central directory.

Answer: C
Question: 3
Which two tasks does the Key Distributon Center (KDC) performo (Choose two.)
A. issues service tckets
B. authentcates services
C. issues tck-nrantnn-tckets
D. validates passwords sent in clear text
E. provides private sessions to services

Answer: A, C
Question: 4
Given:
jupiter$md5,rounds=2006$2amXesSj5$$kCF48vfPsHDjIKNXeEw7.: 12210::::::

What is the characteristc of this /etc/shadow entryo


A. User jupiter uses the md5 hash, with salt 2006$2amXesSj5$, and with the encrypted password
$kCF48vFPsHDjIKNXeEw7V.
B. User jupiter uses the 2a hash, with 2006 iteratons of the hash, with salt 2amxesSj5, and with the
encrypted password kCF48vfPsHDjIKNXeEw7V.
C. User Jupiter uses the md5 hash, with 2006 iteratons of the hash, with salt 2amXessj5, and with
the encrypted password kCF48vfPsHDjIKNXeEw7V.
D. User jupiter uses the md5 hash, with 2006 iteratons of the hash, with no salt, and with the
encrypted password $rQmxesSj5$$kCF48vfPsHDjIKNXeEw7V.

Answer: C
Question: 5
A security administrator is required to validate the intenrity of a set of operatnn system fles on a
number of Solaris systems. The administrator decides to use the Solaris Finnerprint Database to
validate confnuraton and data fles as well as binaries and libraries. What command, available by
default in Solaris 10, will help the security administrator collect the necessary informaton that will
be used with the Solaris Finnerprint Databaseo
A. md5sum
B. dinest
C. encrypt
D. elfsinn
E. cryptoadm

Answer: B
Question: 6
You are confnurinn a new system to be used as an intranet web server. Afer you have installed the
minimal amount of packanes and patched the system, you added the appropriate web server
packanes (SUNWapch2r and SUNWapch2u). By default, the web server daemon will be started usinn
UID webservd and the basic privilene set. To comply with the companys policy of least privilene, you
need to minimize the privilenes that the web server will have. What will you modify to specify the
privilenes that the web service will run witho
A. the PRIV_DEFAULT setnn in /etc/security/policy.conf
B. the defaultpriv setnn of webserverd in /etc/user_atr
C. the privilenes properly of the web service in the SMF repository
D. the privs property of the web service in /etc/security/exec_atr

Answer: C
Question: 7
Afer a recent audit, you have been requested to minimize an existnn Solaris system which runs a
third party database applicaton. Which two should you do before startnn to minimize the systemo
(Choose two.)

A. Back up the system.


B. Remove any unneeded patches.
C. Install the SUNWrnet metac luster.
D. Remove any unneeded packanes.
E. Confrm with the vendor of the database sofware that they support minimizaton.

Answer: A, E
Question: 8
You maintain a minimized and hardened web server. The exhibit shows the current credentals that
the web server runs with. You receive a complaint about the fact that a newly installed web-based
applicaton does not functon. This applicaton is based on a /bin/ksh cni-bin script. What setnn
prevents this cni-bin pronram from workinno
A. The system minht NOT have /bin/ksh installed.
B. The server is NOT allowed to call the exec system call.
C. The server should run with uid=0 to run cni-bin scripts.
D. Some of the libraries needed by /bin/ksh are NOT present in the webservers chroot environment.

Answer: B
Question: 9
One of the operators of the mainframe nroup was moved to the UNIX nroup and tasked to actvate
and confnure password history. For every user, the last 10 passwords should be remembered in the
history. In what fle is the size of the password history confnuredo
A. /etc/shadow
B. /etc/pam.conf
C. /etc/default/passwd
D. /etc/security/policy.conf

Answer: C
Question: 10
Within the context of fle intenrity, rules can be implemented to channe the scope of the Basic
Audit and Report Tool (BART) manifest.
Given the rule fle:
/home/bert/docs *.on[dt]
CHECK all
IGNORE mtme
Which two statements are valido (Choose two.)
A. All fles on the system will be checked.
B. The last modifcaton tme of all checked fles will not be checked.
C. Keywords such as CHECK and IGNORE can NOT be used in a rule fle.
D. Only fles with extension .ont and .ond in the directory /home/bert/docs will be checked.

E. All fles on the system will be checked, except for fles with extensions .ont and .ond in the
directory /home/bert/docs.

Answer: B, D
Question: 11
Solaris Auditnn supports the selectve lonninn of which two kinds of eventso (Choose two.)
A. fle access by selected users
B. access to selected fles by all users
C. selected users makinn outbound network connectons
D. password channes which do not meet the system password policy

Answer: A, C
Question: 12
A security administrator creates a directory called prevoy with the followinn access control policy:
$ netacl prevoy
#fle: prevoy
# owner: secadm
# nroup: secadm
user::rwx nroup::r-x #efectve:r-x
mask: r-x
other: r-x
default: user::rdefault:user:sysadm: rwdefault: nroup::rdefault:nroup:sysadm:rwdefauIt:mask: rwx
default: other:--Into this directory, the security administrator creates a fle called secrets. The is command reports
the followinn for the prevoy directory and secrets fle:
$ Is -Id . secrets
drwxr-xr-x+ 2 secadm secadm 512 Jun 6 16:38
-rr------- + 1 secadm secadm 0 Jun 6 16:38 secrets
Which two actons can be successfully taken by the sysadm roleo (Choose two.)
A. The sysadm role can read the secrets fle.
B. The sysadm role can write to the secrets fle.
C. The sysadm role can remove the secrets fle.
D. The sysadm role can create new fles under the prevoy directory.
E. The sysadm role can channe the Access Control Lists of the prevoy directory.

Answer: A, B
Question: 13
The /etc/default/passwd fle contains a number of confnuraton parameters that can be used to

constrain the character compositon or user passwords. What is one or the danners or havinn
password compositon too tnhtly constrainedo
A. Password complexity rules apply only to the Ennlish alphabet.
B. The entropy or the resultnn password strinns will be very hinh.
C. Duplicaton or encrypted user password strinns is much more likely.
D. Limited password value possibilites can simplify brute force atacks.
E. Passwords are harder to compute when usinn many character classes.

Answer: D
Question: 14
Which two commands are part of Sun Update Connectono (Choose two.)
A. /usr/bin/pknadm
B. /usr/bin/keytool
C. /usr/sbin/smpatch
D. /usr/sbin/patchadd
E. /usr/bin/updatemananer

Answer: C, E
Question: 15
To harden a newly installed Solaris OS, an administrator is required to make sure that syslond is
confnured to NOT accept messanes from the network. Which supported method can be used to
confnure syslond like thiso
A. Run svcadm disable -t svc:/network/system-Ion.
B. Edit /etc/default/syslond to set LOG_FROM_REMOTE=NO.
C. Edit /etc/rc2.d/S74syslon to start syslond with the -t opton.
D. Edit /lib/svc/method/system-lon to set LOG_FROM_REMOTE=NO.

Answer: B
Question: 16
Which are two advantanes of the Service Mananement Facility compared to the init.d startup scriptso
(Choose two.)
A. It restarts processes if they die.
B. It handles service dependencies.
C. It has methods to start and stop the service.
D. It specifes what the system should do at each run level.

Answer: A, B
Question: 17

You have been asked to implement defense in depth for network access to a system, where a web
server will be runninn on an lnternet-facinn network interface. Which is NOT contributnn to the
defense in deptho
A. runninn the web server in a zone
B. usinn svcadm to disable unused services
C. usinn IP Filter to limit which network ports can be accessed from the Internet
D. usinn VLANs on a sinnle network interface instead of usinn multple network interfaces
E. usinn TCP wrappers to limit from which system SSH be used to connect to the system

Answer: D
Question: 18
A new security related patch has been released for the Solaris OS. This patch needs to be applied to
the system that functons as your web server. The web server is confnured to run in a non-nlobal
zone. Can you just use patchadd to apply the patch to the nlobal zone to update the web server
zoneo
A. No, you need to shut down the web server zone frst.
B. Yes, patches will be automatcally applied to all zones.
C. No, you need to apply the patch to the web server zone separately.
D. Yes, but you must make sure that the web server zone is booted frst.

Answer: B
Question: 19
You decided it was worth maintaininn an extremely paranoid policy when confnurinn your frewall
rules. Therefore, you had your mananement approve the implementaton of a security policy stance
to deny all inbound connecton requests to your corporate network. How is it possible that you stll
sufer from remote exploits that your adversaries are usinn to obtain interactve sessions inside your
frewallo
A. TCP splicinn is easy to do.
B. Internal sofware may be vulnerable.
C. UDP vulnerabilites are well-known and exploited.
D. ICMP hijackinn atacks can stll succeed throunh any frewall.

Answer: B
Question: 20
You have been asked to nrant the user ennovy, a member of the staf nroup, read and write access to
the fle /app/notes which has the followinn propertes:
Is -I/app/notes
-rw-rw---- 1 root app 0 Jun 6 15:11/app/notes
Which optons will NOT nrant the user the ability to read and write the fleo

A. usermod -G app ennovy


B. setacl -m user:ennovy:rw- /app/notes
C. setacl -m nroup: staf:rw- /app/notes
D. usermod -K defaultpriv=basic,fle_dac_read,fle_dac_write ennovy

Answer: D
Question: 21
A security administrator has a requirement to make an encrypted backup copy of an applicaton and
its data, usinn the AES alnorithm, so that it can be safely transmited to a partner. Which two
command sequences can be used to nenerate an encrypted backup of the fles under/app1o
(Choose two.)
A. crypt < /app1/*> app1.backup.aes
B. encrypt-a aes -d /app1 -o app1.backup.aes
C. tar cf. /app1 I nzip -d -e aes > app1.backup.aes
D. ufsdump 0f. /app1 |\ crypt-a aes > app1.backup.aes
E. ufsdump 0f-/app1 I\ encrypt -a aes -o app1.backup.aes
F. tar cf-/app1 I\ openssl enc -out app1.backup.aes -aes-128-cbc

Answer: E, F
Question: 22
A cryptonraphically sinned patch provides system administrators with assurance that the patch
possesses certain qualites. Which two qualites are assured when a patch sinnature is verifedo
(Choose two.)
A. The patch has a verifed orinin.
B. The patch has NOT been modifed since it was sinned.
C. The patch was created by a Sun Certfed Systems Ennineer.
D. The contents of the patch have NOT been revealed to anyone who does NOT have a Sun service
plan.

Answer: A, B
Question: 23
A security administrator has a requirement to help confnure and deploy a new server. What are two
security tasks that the security administrator should performo (Choose two.)
A. Confnure the server to use LDAP for authentcaton.
B. Confnure network interfaces and routnn informaton.
C. Install a DTrace probe to capture the use of privilenes.
D. Disable any network services that are NOT beinn used.
E. Apply sofware patches to correct security vulnerabilites.

Answer: D, E

Question: 24
Due to channes to the security policy of your ornanizaton, access restricton must be applied to
systems. The channes specify that access to systems throunh the fp protocol is NOT allowed
accordinn to the Human Resources department, which has the 10.10.10.0/24 address space
assinned. TCP wrappers have been enabled for the fp daemon, and these fles have been confnured:
# cat /etc/hosts.allow
in.fpd: ALL
# cat /etc/hosts.deny
in.fpd: 10.10.10.0/24
Despite the implemented confnuraton, Human Resources is stll able to access systems throunh the
fp protocol. What acton must be takeno
A. The fp daemon must be restarted.
B. The inetd daemon must be restarted.
C. The entry in the hosts.deny fle is wronn and must be channed.
D. The entry in the hosts.allow fle is wronn and must be channed.

Answer: D
Question: 25
Packet flters and frewalls are an important component of any defense-in-depth security strateny.
Which two types of threats can IP Filter be deployed as an efectve countermeasure anainsto
(Choose two.)
A. a Christmas Tree scan
B. an atempt to lon in to a system usinn SSH by an unauthorized user
C. an atempt to exploit a SQL injecton vulnerability in a web storefront applicaton
D. an atempt to exploit a bufer overfow vulnerability in rpcbind, orininatnn from a host on an
authorized network
E. an atempt to exploit a bufer overfow vulnerability in rpcbind, orininatnn from a host on an
unauthorized network

Answer: A, E

THANKS FOR TRYING THE DEMO OF OUR PRODUCT


Visit Our Site to Purchase the Full Set of Actual 1Z0-881 Exam Questons With Answers.

http://www.pass4suretest.com/1Z0-881-exam.html
We Also Provide Practce Exam Sofware That Simulates Real Exam Environment And Has
Many Self-Assessment Features. Download Free Product Demo From:

http://www.pass4suretest.com/1Z0-881-exam.html

Money Back Guarantee

Check Out Our Customer Testmonials

You might also like