List of Sidebars
Chapter 1:
Fundamental Security Concepts
Inside The Exam–General Security Concepts
Chapter 4:
Logging and Process Accounting
Inside The Exam–Manually Disabling User Logins
Inside The Exam–Setting Up the
loginlog
File to Monitor Failed Logins
Inside The Exam–Setting Up syslog to Monitor All Failed Logins
Chapter 5:
Solaris Auditing, Planning, and Management
Inside The Exam–Manually Setting the Free Space Warning Threshold to 25 Percent
Inside The Exam–Manually Selecting Users and Classes of Events to Audit
Chapter 6:
Device, System, and File Security
Inside The Exam–Checking Device Allocation Authorization and Allocating a Device
Inside The Exam–Creating and Comparing BART Manifests
Chapter 7:
Denial of Service Attacks
Inside The Exam–Disabling Executable Stacks
Inside The Exam–Disabling Services
Inside The Exam–Installing, Verifying, and Removing Patches
Chapter 8:
Remote Access Attacks
Inside The Exam–Scheduling ASET to Run Automatically
Inside The Exam–Creating and Viewing File Digests
Chapter 9:
User and Domain Account Management with RBAC
Inside The Exam–Create a Role for the System Administrator Rights Profile
Chapter 10:
Fundamentals of Access Control
Inside The Exam–Disabling Executable Stacks
Chapter 11:
Using Cryptographic Services
Inside The Exam–Creating and Viewing File Digests
Inside The Exam–Computing a MAC with the MD5_HMAC and SHA1_HMAC Mechanisms
Inside The Exam–Encrypting and Decrypting Files with the AES, DES, and DES3 Algorithms