2013年12月2日星期一

SUN certification 310-301 exam best training materials

You can free download part of ITCertKing's practice questions and answers about SUN certification 310-301 exam online. Once you decide to select ITCertKing, ITCertKing will make every effort to help you pass the exam. If you find that our exam practice questions and answers is very different form the actual exam questions and answers and can not help you pass the exam, we will immediately 100% full refund.

ITCertKing provide a good after-sales service for all customers. If you choose to purchase ITCertKing products, ITCertKing will provide you with online service for 24 hours a day and one year free update service, which timely inform you the latest exam information to let you have a fully preparation. We can let you spend a small amount of time and money and pass the IT certification exam at the same time. Selecting the products of ITCertKing to help you pass your first time SUN certification 310-301 exam is very cost-effective.

Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
One year free update, No help, Full refund!
Total Q&A: 240 Questions and Answers
Last Update: 2013-12-02

ITCertKing provide you with the comprehensive SUN 310-301 exam information to help you to succeed. Our training materials are the latest study materials which bring by experts. We help you achieve your success. You can get the most detailed and accurate exam questions and answers from us. Our Training Tools are updated in a timely manner in accordance with the changing of Exam Objectives. In fact, the success is not far away, go down along with ITCertKing, then you will come to the road to success.

If you want to choose passing SUN certification 310-301 exam to make yourself have a more stable position in today's competitive IT area and the professional ability become more powerful, you must have a strong expertise. And passing SUN certification 310-301 exam is not very simple. Perhaps passing SUN certification 310-301 exam is a stepping stone to promote yourself in the IT area, but it doesn't need to spend a lot of time and effort to review the relevant knowledge, you can choose to use our ITCertKing product, a training tool prepared for the IT certification exams.

ITCertKing's SUN 310-301 exam training materials is no other sites in the world can match. Of course, this is not only the problem of quality, it goes without saying that our quality is certainly the best. More important is that ITCertKing's exam training materials is applicable to all the IT exam. So the website of ITCertKing can get the attention of a lot of candidates. They believe and rely on us. It is also embodied the strength of our ITCertKing site. The strength of ITCertKing is embodied in it. Our exam training materials could make you not help recommend to your friends after you buy it. Because it's really a great help to you.

310-301 Free Demo Download: http://www.itcertking.com/310-301_exam.html

NO.1 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.2 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.3 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.4 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.5 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.6 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.7 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.8 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.9 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.10 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.11 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.12 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.13 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.14 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.15 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.16 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.17 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.18 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.19 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

NO.20 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A

SUN exam prep   310-301   310-301 study guide   310-301   310-301 study guide

ITCertKing offer the latest HP2-W100 exam material and high-quality 000-585 pdf questions & answers. Our C_TSCM62_65 VCE testing engine and HP5-T01D study guide can help you pass the real exam. High-quality HP0-J63 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/310-301_exam.html

没有评论:

发表评论