ITCertKing SUN 310-301 exam dumps are the best reference materials. ITCertKing test questions and answers are the training materials you have been looking for. This is a special IT exam dumps for all candidates. ITCertKing pdf real questions and answers will help you prepare well enough for SUN 310-301 test in the short period of time and pass your exam successfully. If you don't want to waste a lot of time and efforts on the exam, you had better select ITCertKing SUN 310-301 dumps. Using this certification training dumps can let you improve the efficiency of your studying so that it can help you save much more time.
310-301 exam is a SUN certification exam and IT professionals who have passed some SUN certification exams are popular in IT industry. So more and more people participate in 310-301 certification exam, but 310-301 certification exam is not very simple. If you do not have participated in a professional specialized training course, you need to spend a lot of time and effort to prepare for the exam. But now ITCertKing can help you save a lot of your precious time and energy.
A lot of IT people want to pass SUN certification 310-301 exams. Thus they can obtain a better promotion opportunity in the IT industry, which can make their wages and life level improved. But in order to pass SUN certification 310-301 exam many people spent a lot of time and energy to consolidate knowledge and didn't pass the exam. This is not cost-effective. If you choose ITCertKing's product, you can save a lot of time and energy to consolidate knowledge, but can easily pass SUN certification 310-301 exam. Because ITCertKing's specific training material about SUN certification 310-301 exam can help you 100% pass the exam. If you fail the exam, ITCertKing will give you a full refund.
If you are still struggling to prepare for passing 310-301 certification exam, at this moment ITCertKing can help you solve problem. ITCertKing can provide you training materials with good quality to help you pass the exam, then you will become a good SUN 310-301 certification member. If you have decided to upgrade yourself by passing SUN certification 310-301 exam, then choosing ITCertKing is not wrong. Our ITCertKing promise you that you can pass your first time to participate in the SUN certification 310-301 exam and get SUN 310-301 certification to enhance and change yourself.
Having SUN certification 310-301 exam certificate is equivalent to your life with a new milestone and the work will be greatly improved. I believe that everyone in the IT area is eager to have it. A lot of people in the discussion said that such a good certificate is difficult to pass and actually the pass rate is quite low. Not having done any efforts of preparation is not easy to pass, after all, SUN certification 310-301 exam requires excellent expertise. Our ITCertKing is a website that can provide you with a shortcut to pass SUN certification 310-301 exam. ITCertKing have a training tools of SUN certification 310-301 exam which can ensure you pass SUN certification 310-301 exam and gain certificate, but also can help you save a lot of time. Such a ITCertKing that help you gain such a valuable certificate with less time and less money is very cost-effective for you.
Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
One year free update, No help, Full refund!
Total Q&A: 240 Questions and Answers
Last Update: 2014-01-24
310-301 Free Demo Download: http://www.itcertking.com/310-301_exam.html
NO.1 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A
SUN pdf 310-301 310-301 test answers 310-301
NO.2 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C
SUN pdf 310-301 310-301 test answers 310-301
NO.3 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C
SUN pdf 310-301 310-301 test answers 310-301
NO.4 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C
SUN pdf 310-301 310-301 test answers 310-301
NO.5 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A
SUN pdf 310-301 310-301 test answers 310-301
NO.6 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D
SUN pdf 310-301 310-301 test answers 310-301
NO.7 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B
SUN pdf 310-301 310-301 test answers 310-301
NO.8 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A
SUN pdf 310-301 310-301 test answers 310-301
NO.9 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C
SUN pdf 310-301 310-301 test answers 310-301
NO.10 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A
SUN pdf 310-301 310-301 test answers 310-301
NO.11 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D
SUN pdf 310-301 310-301 test answers 310-301
NO.12 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B
SUN pdf 310-301 310-301 test answers 310-301
NO.13 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E
SUN pdf 310-301 310-301 test answers 310-301
NO.14 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D
SUN pdf 310-301 310-301 test answers 310-301
NO.15 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D
SUN pdf 310-301 310-301 test answers 310-301
NO.16 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A
SUN pdf 310-301 310-301 test answers 310-301
NO.17 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C
SUN pdf 310-301 310-301 test answers 310-301
NO.18 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A
SUN pdf 310-301 310-301 test answers 310-301
NO.19 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A
SUN pdf 310-301 310-301 test answers 310-301
NO.20 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C
SUN pdf 310-301 310-301 test answers 310-301
ITCertKing offer the latest 70-460 exam material and high-quality NS0-156 pdf questions & answers. Our HP0-J61 VCE testing engine and 1Y0-200 study guide can help you pass the real exam. High-quality 156-315.13 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.
Article Link: http://www.itcertking.com/310-301_exam.html
没有评论:
发表评论