The curtain of life stage may be opened at any time, the key is that you are willing to show, or choose to avoid. Most of People who can seize the opportunityin front of them are successful. So you have to seize this opportunity of IT-Tests.com. Only with it can you show your skills. IT-Tests.com SUN 310-301 exam training materials is the most effective way to pass the certification exam. With this certification, you will achieve your dreams, and become successful.
The site of IT-Tests.com is well-known on a global scale. Because the training materials it provides to the IT industry have no-limited applicability. This is the achievement made by IT experts in IT-Tests.com after a long period of time. They used their knowledge and experience as well as the ever-changing IT industry to produce the material. The effect of IT-Tests.com's SUN 310-301 exam training materials is reflected particularly good by the use of the many candidates. If you participate in the IT exam, you should not hesitate to choose IT-Tests.com's SUN 310-301 exam training materials. After you use, you will know that it is really good.
SUN certification 310-301 exam can give you a lot of change. Such as work, life would have greatly improve. Because, after all, 310-301 is a very important certified exam of SUN. But 310-301 exam is not so simple.
Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
IT-Tests.com promise that we will spare no effort to help you pass SUN certification 310-301 exam. Now you can free download part of practice questions and answers of SUN certification 310-301 exam on IT-Tests. When you select IT-Tests, you can not only pass SUN certification 310-301 exam, but also have one year free update service. IT-Tests.com can also promise if you fail to pass the exam, IT-Tests.com will 100% refund.
SUN 310-301 is a certification exam to test IT professional knowledge. IT-Tests.com is a website which can help you quickly pass the SUN certification 310-301 exams. Before the exam, you use pertinence training and test exercises and answers that we provide, and in a short time you'll have a lot of harvest.
In order to allow you to safely choose IT-Tests, part of the best SUN certification 310-301 exam materials provided online, you can try to free download to determine our reliability. We can not only help you pass the exam once for all, but also can help you save a lot of valuable time and effort. IT-Tests.com can provide you with the real SUN certification 310-301 exam practice questions and answers to ensure you 100% pass the exam. When having passed SUN certification 310-301 exam your status in the IT area will be greatly improved and your prospect will be good.
310-301 (Sun Certified Security Administrator) Free Demo Download: http://www.it-tests.com/310-301.html
NO.1 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.2 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.3 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.4 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.5 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.6 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.7 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.8 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.9 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.10 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.11 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.12 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.13 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.14 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.15 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.16 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.17 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.18 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.19 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
NO.20 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B
SUN certification training 310-301 exam prep 310-301 310-301 pdf 310-301 310-301 practice test
IT-Tests.com have the latest SUN certification 310-301 exam training materials. The industrious IT-Tests's IT experts through their own expertise and experience continuously produce the latest SUN 310-301 training materials to facilitate IT professionals to pass the SUN certification 310-301 exam. The certification of SUN 310-301 more and more valuable in the IT area and a lot people use the products of IT-Tests.com to pass SUN certification 310-301 exam. Through so many feedbacks of these products, our IT-Tests.com products prove to be trusted.
没有评论:
发表评论