2013年11月17日星期日

Latest training guide for SUN 310-301

If you want to achieve maximum results with minimum effort in a short period of time, and want to pass the SUN 310-301 exam. You can use IT-Tests.com's SUN 310-301 exam training materials. The training materials of IT-Tests.com are the product that through the test of practice. Many candidates proved it does 100% pass the exam. With it, you will reach your goal, and can get the best results.

What is IT-Tests.com SUN 310-301 exam training materials? There are many online sites provide SUN 310-301 exam training resources. But IT-Tests.com provide you the most actual information. IT-Tests.com have professional personnel of certification experts, technical staff, and comprehensive language masters. They are always studying the latest SUN 310-301 exam. Therefore, if you want to pass the SUN 310-301 examination, please Login IT-Tests.com website. It will let you close to your success, and into your dream paradise step by step.

Are you worried about how to passs the terrible SUN 310-301 exam? Do not worry, With IT-Tests.com's SUN 310-301 exam training materials in hand, any IT certification exam will become very easy. IT-Tests.com's SUN 310-301 exam training materials is a pioneer in the SUN 310-301 exam certification preparation.

IT-Tests.com site has a long history of providing SUN 310-301 exam certification training materials. It has been a long time in certified IT industry with well-known position and visibility. Our SUN 310-301 exam training materials contains questions and answers. Our experienced team of IT experts through their own knowledge and experience continue to explore the exam information. It contains the real exam questions, if you want to participate in the SUN 310-301 examination certification, select IT-Tests.com is unquestionable choice.

If you are interested in IT-Tests's training program about SUN certification 310-301 exam, you can first on WWW.IT-Tests.COM to free download part of the exercises and answers about SUN certification 310-301 exam as a free try. We will provide one year free update service for those customers who choose IT-Tests's products.

If you are sure that you want to pass SUN certification 310-301 exam, then your selecting to purchase the training materials of IT-Tests.com is very cost-effective. Because this is a small investment in exchange for a great harvest. Using IT-Tests's test questions and exercises can ensure you pass SUN certification 310-301 exam. IT-Tests.com is a website which have very high reputation and specifically provide simulation questions, practice questions and answers for IT professionals to participate in the SUN certification 310-301 exam.

Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 240 Questions and Answers
Last Update: 2013-11-17

310-301 (Sun Certified Security Administrator) Free Demo Download: http://www.it-tests.com/310-301.html

NO.1 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D

SUN practice test   310-301   310-301 test   310-301 test questions

NO.2 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D

SUN practice test   310-301   310-301 test   310-301 test questions

NO.3 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A

SUN practice test   310-301   310-301 test   310-301 test questions

NO.4 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C

SUN practice test   310-301   310-301 test   310-301 test questions

NO.5 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D

SUN practice test   310-301   310-301 test   310-301 test questions

NO.6 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A

SUN practice test   310-301   310-301 test   310-301 test questions

NO.7 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E

SUN practice test   310-301   310-301 test   310-301 test questions

NO.8 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A

SUN practice test   310-301   310-301 test   310-301 test questions

NO.9 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C

SUN practice test   310-301   310-301 test   310-301 test questions

NO.10 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A

SUN practice test   310-301   310-301 test   310-301 test questions

NO.11 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C

SUN practice test   310-301   310-301 test   310-301 test questions

NO.12 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A

SUN practice test   310-301   310-301 test   310-301 test questions

NO.13 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B

SUN practice test   310-301   310-301 test   310-301 test questions

NO.14 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D

SUN practice test   310-301   310-301 test   310-301 test questions

NO.15 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A

SUN practice test   310-301   310-301 test   310-301 test questions

NO.16 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C

SUN practice test   310-301   310-301 test   310-301 test questions

NO.17 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C

SUN practice test   310-301   310-301 test   310-301 test questions

NO.18 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B

SUN practice test   310-301   310-301 test   310-301 test questions

NO.19 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C

SUN practice test   310-301   310-301 test   310-301 test questions

NO.20 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A

SUN practice test   310-301   310-301 test   310-301 test questions

IT-Tests.com offer the latest C-TSCM62-64 Questions & Answers and high-quality 000-155 PDF Practice Test. Our 00M-653 VCE testing engine and MB6-700 study guide can help you pass the real exam. High-quality LOT-405 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.it-tests.com/310-301.html

没有评论:

发表评论