SUN 310-301 certification exam is among those popular IT certifications. It is also the dream of ambitious IT professionals. This part of the candidates need to be fully prepared to allow them to get the highest score in the 310-301 exam, make their own configuration files compatible with market demand.
IT-Tests.com has special training tools for SUN certification 310-301 exam, which can make you do not need to spend a lot of time and money but can get a lot of knowledge of IT technology to enhance your skills in a short time. And soon you will be able to prove your expertise knowledge and technology in IT industry. IT-Tests's training courses for SUN certification 310-301 exam is developed by the study of IT-Tests.com experts team to use their knowledge and experience.
As long as you need the exam, we can update the SUN certification 310-301 exam training materials to meet your examination needs. IT-Tests's training materials contain many practice questions and answers about SUN 310-301 and they can 100% ensure you pass SUN 310-301 exam. With the training materials we provide, you can take a better preparation for the exam. And we will also provide you a year free update service.
In this competitive IT industry, having some authentication certificate can help you promote job position. Many companies that take a job promotion or increase salary for you will refer to how many gold content your authentication certificates have. SUN 310-301 is a high gold content certification exam. SUN 310-301 authentication certificate can meet many IT employees' needs. IT-Tests.com can provide you with SUN certification 310-301 exam targeted training. You can free download IT-Tests's trial version of raining tools and some exercises and answers about SUN certification 310-301 exam as a try.
After the advent of the IT-Tests's latest SUN certification 310-301 exam practice questions and answers, passing SUN certification 310-301 exam is no longer a dream of the IT staff. All of IT-Tests's practice questions and answers about SUN certification 310-301 exam have high quality and 95% similarity with the real exam questions. IT-Tests.com is worthful to choose. If you choose IT-Tests's products, you will be well prepared for SUN certification 310-301 exam and then successfully pass the exam.
Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 240 Questions and Answers
Last Update: 2013-12-29
Selecting the products of IT-Tests.com which provide the latest and the most accurate information about SUN 310-301, your success is not far away.
310-301 exam is a SUN certification exam and IT professionals who have passed some SUN certification exams are popular in IT industry. So more and more people participate in 310-301 certification exam, but 310-301 certification exam is not very simple. If you do not have participated in a professional specialized training course, you need to spend a lot of time and effort to prepare for the exam. But now IT-Tests.com can help you save a lot of your precious time and energy.
310-301 (Sun Certified Security Administrator) Free Demo Download: http://www.it-tests.com/310-301.html
NO.1 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A
SUN demo 310-301 310-301
NO.2 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C
SUN demo 310-301 310-301
NO.3 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A
SUN demo 310-301 310-301
NO.4 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C
SUN demo 310-301 310-301
NO.5 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A
SUN demo 310-301 310-301
NO.6 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C
SUN demo 310-301 310-301
NO.7 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D
SUN demo 310-301 310-301
NO.8 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B
SUN demo 310-301 310-301
NO.9 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D
SUN demo 310-301 310-301
NO.10 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E
SUN demo 310-301 310-301
NO.11 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B
SUN demo 310-301 310-301
NO.12 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A
SUN demo 310-301 310-301
NO.13 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C
SUN demo 310-301 310-301
NO.14 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D
SUN demo 310-301 310-301
NO.15 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C
SUN demo 310-301 310-301
NO.16 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A
SUN demo 310-301 310-301
NO.17 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A
SUN demo 310-301 310-301
NO.18 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C
SUN demo 310-301 310-301
NO.19 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D
SUN demo 310-301 310-301
NO.20 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A
SUN demo 310-301 310-301
IT-Tests.com offer the latest C_TADM51_70 Questions & Answers and high-quality 100-500 PDF Practice Test. Our 700-501 VCE testing engine and 1z0-460 study guide can help you pass the real exam. High-quality CV0-001 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.
Article Link: http://www.it-tests.com/310-301.html
没有评论:
发表评论