Are you still upset about how to pass SUN certification 310-301 exam? Are you still waiting for the latest information about SUN certification 310-301 exam? IT-Tests.com has come up with the latest training material about SUN certification 310-301 exam. Do you want to pass SUN certification 310-301 exam easily? Please add IT-Tests's SUN certification 310-301 exam practice questions and answers to your cart now! IT-Tests.com has provided part of SUN certification 310-301 exam practice questions and answers for you on www.IT-Tests.com and you can free download as a try. I believe you will be very satisfied with our products. With our products you can easily pass the exam. We promise that if you have used IT-Tests's latest SUN certification 310-301 exam practice questions and answers exam but fail to pass the exam, IT-Tests.com will give you a full refund.
IT-Tests.com can provide you a pertinence training and high quality exercises, which is your best preparation for your first time to attend SUN certification 310-301 exam. IT-Tests's exercises are very similar with the real exam, which can ensure you a successful passing the SUN certification 310-301 exam. If you fail the exam, we will give you a full refund.
In order to pass SUN certification 310-301 exam, selecting the appropriate training tools is very necessary. And professional study materials about SUN certification 310-301 exam is a very important part. Our IT-Tests can have a good and quick provide of professional study materials about SUN certification 310-301 exam. Our IT-Tests.com IT experts are very experienced and their study materials are very close to the actual exam questions, almost the same. IT-Tests.com is a convenient website specifically for people who want to take the certification exams, which can effectively help the candidates to pass the exam.
Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 240 Questions and Answers
Last Update: 2013-11-18
IT-Tests's products are developed by a lot of experienced IT specialists using their wealth of knowledge and experience to do research for IT certification exams. So if you participate in SUN certification 310-301 exam, please choose our IT-Tests's products, IT-Tests.com can not only provide you a wide coverage and good quality exam information to guarantee you to let you be ready to face this very professional exam but also help you pass SUN certification 310-301 exam to get the certification.
310-301 (Sun Certified Security Administrator) Free Demo Download: http://www.it-tests.com/310-301.html
NO.1 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.2 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.3 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.4 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.5 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.6 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.7 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.8 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.9 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.10 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.11 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.12 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.13 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.14 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.15 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.16 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.17 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.18 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.19 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
NO.20 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A
SUN exam 310-301 test answers 310-301 exam prep 310-301 certification training
IT-Tests.com offer the latest NS0-155 Questions & Answers and high-quality 70-466 PDF Practice Test. Our EX0-118 VCE testing engine and LOT-440 study guide can help you pass the real exam. High-quality 70-410 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.
Article Link: http://www.it-tests.com/310-301.html
没有评论:
发表评论