IT-Tests.com is a specialized IT certification exam training website which provide you the targeted exercises and current exams. We focus on the popular SUN certification 310-301 exam and has studied out the latest training programs about SUN certification 310-301 exam, which can meet the needs of many people. SUN 310-301 certification is a reference of many well-known IT companies to hire IT employee. So this certification exam is very popular now. IT-Tests.com is also recognized and relied by many people. IT-Tests.com can help a lot of people achieve their dream. If you choose IT-Tests, but you do not successfully pass the examination, IT-Tests.com will give you a full refund.
To help you prepare for 310-301 examination certification, we provide you with a sound knowledge and experience. The questions designed by IT-Tests.com can help you easily pass the exam. The IT-Tests.com SUN 310-301 practice including 310-301 exam questions and answers, 310-301 test, 310-301 books, 310-301 study guide.
IT-Tests.com's SUN 310-301 exam training materials provide the two most popular download formats. One is PDF, and other is software, it is easy to download. The IT professionals and industrious experts in IT-Tests.com make full use of their knowledge and experience to provide the best products for the candidates. We can help you to achieve your goals.
IT-Tests.com SUN 310-301 practice exam is the most thorough, most accurate and latest practice test. You will find that it is the only materials which can make you have confidence to overcome difficulties in the first. SUN 310-301 exam certification are recognized in any country in the world and all countries will be treate it equally. SUN 310-301 certification not only helps to improve your knowledge and skills, but also helps your career have more possibility.
If you're still studying hard to pass the SUN 310-301 exam, IT-Tests.com help you to achieve your dream. We provide you with the best SUN 310-301 exam materials. It passed the test of practice, and with the best quality. It is better than SUN 310-301 tutorials and any other related materials. It can help you to pass the SUN 310-301 exam, and help you to become a strong IT expert.
Now IT industry is more and more competitive. Passing SUN 310-301 exam certification can effectively help you entrench yourself and enhance your status in this competitive IT area. In our IT-Tests.com you can get the related SUN 310-301 exam certification training tools. Our IT-Tests.com IT experts team will timely provide you the accurate and detailed training materials about SUN certification 310-301 exam. Through the learning materials and exam practice questions and answers provided by IT-Tests, we can ensure you have a successful challenge when you are the first time to participate in the SUN certification 310-301 exam. Above all, using IT-Tests.com you do not spend a lot of time and effort to prepare for the exam.
Feedbacks of many IT professionals who have passed SUN certification 310-301 exam prove that their successes benefit from IT-Tests's help. IT-Tests's targeted test practice questions and answers to gave them great help, which save their valuable time and energy, and allow them to easily and smoothly pass their first SUN certification 310-301 exam. So IT-Tests.com a website worthy of your trust. Please select IT-Tests, you will be the next successful IT person. IT-Tests.com will help you achieve your dream.
Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 240 Questions and Answers
Last Update: 2013-12-19
310-301 (Sun Certified Security Administrator) Free Demo Download: http://www.it-tests.com/310-301.html
NO.1 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A
SUN pdf 310-301 original questions 310-301 questions
NO.2 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A
SUN pdf 310-301 original questions 310-301 questions
NO.3 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E
SUN pdf 310-301 original questions 310-301 questions
NO.4 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D
SUN pdf 310-301 original questions 310-301 questions
NO.5 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A
SUN pdf 310-301 original questions 310-301 questions
NO.6 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D
SUN pdf 310-301 original questions 310-301 questions
NO.7 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C
SUN pdf 310-301 original questions 310-301 questions
NO.8 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C
SUN pdf 310-301 original questions 310-301 questions
NO.9 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A
SUN pdf 310-301 original questions 310-301 questions
NO.10 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B
SUN pdf 310-301 original questions 310-301 questions
NO.11 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B
SUN pdf 310-301 original questions 310-301 questions
NO.12 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A
SUN pdf 310-301 original questions 310-301 questions
NO.13 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D
SUN pdf 310-301 original questions 310-301 questions
NO.14 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D
SUN pdf 310-301 original questions 310-301 questions
NO.15 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A
SUN pdf 310-301 original questions 310-301 questions
NO.16 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A
SUN pdf 310-301 original questions 310-301 questions
NO.17 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C
SUN pdf 310-301 original questions 310-301 questions
NO.18 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C
SUN pdf 310-301 original questions 310-301 questions
NO.19 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C
SUN pdf 310-301 original questions 310-301 questions
NO.20 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C
SUN pdf 310-301 original questions 310-301 questions
IT-Tests.com offer the latest C_TADM51_70 Questions & Answers and high-quality JN0-692 PDF Practice Test. Our IIA-CFSA VCE testing engine and 000-623 study guide can help you pass the real exam. High-quality 1Z0-478 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.
Article Link: http://www.it-tests.com/310-301.html
没有评论:
发表评论