ITCertKing's SUN 310-301 exam training materials not only can save your energy and money, but also can save a lot of time for you. Because the things what our materials have done, you might need a few months to achieve. So what you have to do is use the ITCertKing SUN 310-301 exam training materials. And obtain this certificate for yourself. ITCertKing will help you to get the knowledge and experience that you need and will provide you with a detailed SUN 310-301 exam objective. So with it, you will pass the exam.
Each IT person is working hard for promotion and salary increases. It is also a reflection of the pressure of modern society. We should use the strength to prove ourselves. Participate in the SUN 310-301 exam please. In fact, this examination is not so difficult as what you are thinking. You only need to select the appropriate training materials. ITCertKing's SUN 310-301 exam training materials is the best training materials. Select the materials is to choose what you want. In order to enhance your own, do it quickly.
ITCertKing is a very good website to provide a convenient service for the SUN certification 310-301 exam. ITCertKing's products can help people whose IT knowledge is not comprehensive pass the difficulty SUN certification 310-301 exam. If you add the SUN certification 310-301 exam product of ITCertKing to your cart, you will save a lot of time and effort. ITCertKing's product is developed by ITCertKing's experts' study of SUN certification 310-301 exam, and it is a high quality product.
More and more people choose SUN 310-301 exam. Because of its popularity, you can use the ITCertKing SUN 310-301 exam questions and answers to pass the exam. This will bring you great convenience and comfort. This is a practice test website. It is available on the Internet with the exam questions and answers, as we all know, ITCertKing is the professional website which provide SUN 310-301 exam questions and answers.
Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
One year free update, No help, Full refund!
Total Q&A: 240 Questions and Answers
Last Update: 2013-10-05
ITCertKing SUN 310-301 exam training materials praised by the majority of candidates is not a recent thing. This shows ITCertKing SUN 310-301 exam training materials can indeed help the candidates to pass the exam. Compared to other questions providers, ITCertKing SUN 310-301 exam training materials have been far ahead. uestions broad consumer recognition and reputation, it has gained a public praise. If you want to participate in the SUN 310-301 exam, quickly into ITCertKing website, I believe you will get what you want. If you miss you will regret, if you want to become a professional IT expert, then quickly add it to cart.
With ITCertKing's help, you do not need to spend a lot of money to participate in related cram or spend a lot of time and effort to review the relevant knowledge, but can easily pass the exam. Simulation test software of SUN 310-301 exam is developed by ITCertKing's research of previous real exams. ITCertKing's SUN 310-301 exam practice questions have a lot of similarities with the real exam practice questions.
SUN certification 310-301 exam is very popular among the IT people to enroll in the exam. Passing SUN certification 310-301 exam can not only chang your work and life can bring, but also consolidate your position in the IT field. But the fact is that the passing rate is very low.
310-301 Free Demo Download: http://www.itcertking.com/310-301_exam.html
NO.1 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C
SUN 310-301 310-301 310-301 310-301
NO.2 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D
SUN 310-301 310-301 310-301 310-301
NO.3 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C
SUN 310-301 310-301 310-301 310-301
NO.4 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C
SUN 310-301 310-301 310-301 310-301
NO.5 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B
SUN 310-301 310-301 310-301 310-301
NO.6 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C
SUN 310-301 310-301 310-301 310-301
NO.7 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A
SUN 310-301 310-301 310-301 310-301
NO.8 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A
SUN 310-301 310-301 310-301 310-301
NO.9 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A
SUN 310-301 310-301 310-301 310-301
NO.10 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D
SUN 310-301 310-301 310-301 310-301
NO.11 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E
SUN 310-301 310-301 310-301 310-301
NO.12 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A
SUN 310-301 310-301 310-301 310-301
NO.13 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C
SUN 310-301 310-301 310-301 310-301
NO.14 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A
SUN 310-301 310-301 310-301 310-301
NO.15 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A
SUN 310-301 310-301 310-301 310-301
NO.16 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D
SUN 310-301 310-301 310-301 310-301
NO.17 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D
SUN 310-301 310-301 310-301 310-301
NO.18 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B
SUN 310-301 310-301 310-301 310-301
NO.19 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A
SUN 310-301 310-301 310-301 310-301
NO.20 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C
SUN 310-301 310-301 310-301 310-301
ITCertKing offer the latest 646-048 exam material and high-quality 000-652 pdf questions & answers. Our PMI-100 VCE testing engine and 74-338 study guide can help you pass the real exam. High-quality 650-304 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.
Article Link: http://www.itcertking.com/310-301_exam.html
没有评论:
发表评论