You are the primary administrator for a set of Oracle Solaris 11 servers. You noticed some
changes to configuration files. You are concerned that someone may have unauthorized access
or that an authorized user may be abusing the access privilege. You decide to track a set of
security events across multiple servers. How will you configure the systems for this?
A.
Use audit-config to add the servers’ host names to the audit_remote plug in.
B.
Add centralized NFS file systems to the /etc/security/audit_control file on each server.
C.
Modify the /etc/security/audit_startup file and add audit_remote logging on each server.
D.
Configure a centralized system-logging server and direct all servers to use it.
A