Previous Page
Next Page

Appendix A: Final Test Study Guide


Following are the key points from certification objectives in this book that are covered on the exam. It's in your best interest to study this guide until you can answer all questions in Appendix B correctly before taking Sun's exam.

Describe Principles of Information Security

Identify the Security Life Cycle and Describe Best Security Practices

Explain Attackers, Motives, and Methods

Identify, Monitor, and Disable Logins

Configure Solaris Auditing and Customize Audit Events

Control Access to Devices by Configuring and Managing Device Policy and Allocation

Use the Basic Audit Reporting Tool to Create a Manifest and Check System Integrity

Differentiate Between the Types of Host-Based Denial of Service Attacks and Understand How Attacks Are Executed

Establish Courses of Action to Prevent Denial of Service Attacks

Identify, Detect, and Protect Against Trojan Horse Programs and Backdoors

Describe the Benefits and Capabilities of Role-Based Access Control

Explain How to Configure and Audit Role-Based Access Control

Use UNIX Permissions to Protect Files

Use Access Control Lists to Set File Permissions

Explain How to Protect Files Using the Solaris Cryptographic Framework

Administer the Solaris Cryptographic Framework

Explain and Configure Secure RPC to Authenticate a Host and a User Across an NFS Mount

Use the PAM Framework to Configure the Use of System Entry Services for User Authentication

Explain the Simple Authentication and Security Layer (SASL) in Solaris

Use Solaris Secure Shell to Access a Remote Host Securely Over an Unsecured Network

Define the Sun Enterprise Authentication Mechanism and Configuration Issues

Configure and Administer the Sun Enterprise Authentication Mechanism

Previous Page
Next Page