Commands can be listed in multiple profiles with different attributes. Additionally, the system takes
the default profiles into account.
Which description matches the algorithm the Solaris system uses to determine the attributes of an
executable?
A.
The system searches the profiles in order, starting with the default profiles from
/etc/security/policy .conf, the profiles in user_attr(4), followed by All, if NOT already specified.
B.
The system searches the profiles in order, starting with the profiles in user_attr(4), then the
default profiles from /etc/security/policy .conf, followed by All, if NOT already specified.
C.
The order of the profiles listed is irrelevant. The system applies the best match, ignoring
possible earlier wild card matches, preferring profiles from user_attr(4)-D. The order of the profiles listed is irrelevant. The system applies the best match, ignoring
possible earlier wild card matches.
E.
The order of the profiles listed is irrelevant. The system applies the best match, ignoring
possible earlier wild card matches, preferring the default profile from /etc/security/policy. conf.