Oracle Solaris 10 Security Administrator Certified Expert Exam
цена: 13000 руб.
Для юридических лиц: 13000 руб.

Чтобы забронировать место авторизуйтесь на сайте или пройдите регистрацию.

Oracle Solaris 10 Security Administrator Certified Expert Exam

Код: 1Z0-881
продолжительность: 90 минут
Язык обучения: English
Тестовая система: Pearson VUE
Филиал: Москва


Exam Topics:

Section 1: General Security Principles and Features

  • Describe basic security principles including the need for a security policy, process, education and the need to audit, patch and securely configure systems.
  • Describe the purpose, features, and functions of the Solaris 10 security features as they relate to:
  • Device Policy
  • Kerberos enabled applications, LDAP and Inter operability enhancements
  • Process Rights Management
  • Solaris Containers
  • User Rights Management
  • Describe the purpose, features, and functions of the Solaris 10 security features as they relate to:
  • Password Strength, Syntax Checking, History and Aging Improvements
  • Basic Audit and Report Tool for File Integrity
  • IPfilter Stateful Packet Filtering Firewall
  • Solaris Secure Shell
  • IPsec/IKE Performance Enhancements
  • Describe the purpose, features, and functions of the Solaris 10 security features as they relate to:
  • Solaris Auditing
  • Trusted Extensions
  • PAM Improvements
  • Encryption and Message Digest Functions Built into the Solaris OS

Section 2: Installing Systems Securely

  • Describe minimization including minimal installation, software installation clusters, loose versus strict minimization, and providing consistent, known configuration for installations.
  • Manage patches including describing the Update Manager, describing signed patches, verifying signatures, and specifying a Web Proxy.
  • Perform hardening including implementing the Solaris Security Toolkit (SST).

Section 3: Principles of Least Privilege

  • Implement Process Rights Management including describing PRM, process privileges, determining rights required by process, profiling privileges used by processes, and assigning minimum rights to a process.
  • Implement User Rights Management including using Access Control, using RBAC, and implementing password strength, syntax checking, and history and aging improvements.

Section 4: Cryptographic Features

  • Utilize the Solaris Cryptographic framework including describing the Solaris Cryptographic Framework, using the basic administration tools for Solaris, using the SCF User-Level Commands, describing Framework Management, and using Solaris Cryptographic Framework with a Web server, with a Java-based application and with a Sun Crypto Accelerator.
  • Manage file system security, including using signed ELF objects, implementing BART for file integrity, and using the Solaris Fingerprint Database.

Section 5: Application and Network Security

  • Use the Service Management Facility (SMF) including describing using the SMF, describing the concept of Least Privilege and SMF, describing Authorizations, describing Limit Service Privileges, determining a current service's privileges and configuring a service to reduce privileges.
  • Secure networks including using Access Control, using TCP Wrappers, implementing the IPfitler Stateful Packet Filtering Firewall, describing Kerberos, implementing Solaris Secure Shell (SSH), and describing NFSv4.
  • Implement IPsec including describing IPsec, configuration IPsec, configuring IKE, and troubleshooting IPsec configurations.
  • Describe, implement, configure and troubleshoot Kerberos configurations, including Kerberos clients, KDCs, and Kerberized services such as Secure Shell and NFSv4.

Section 6: Auditing and Zone Security

  • Perform auditing and logging including describing Solaris Audit, configuring audit policy, implementing Solaris audit, configuring for Zones, reviewing audit logs, learning from audit trails, and using tamper proof logging.
  • Implement security in Solaris Zones including describing security characteristics, identifying differences from previous subjects, describe the Global Zones, identifying when and how to use Zones, describing resource management, identifying Zones and network security, and using patching Zones.
  • Describe how Security Components work together, how technologies interact, and identify infrastructure requirements.
  • Manage resources including describing resource controls and resource exhaustion attack prevention.

По вашему запросу ничего не найдено. Попробуйте изменить условия поиска.

Оставить отзыв
Об этом экзамене отзывов пока нет. Будьте первым.