Some sites provide SUN 310-301 exam study materials on the Internet , but they do not have any reliable guarantee. Let me be clear here a core value problem of IT-Tests.com . All SUN exams are very important. In this era of rapid development of information technology, IT-Tests.com just questions provided by one of them. Why do most people choose IT-Tests.com? This is because the exam information provided by IT-Tests.com will certainly be able to help you pass the exam. Why? Because it provides the most up-to-date information, which is the majority of candidates proved by practice.
310-301 exam is a SUN certification exam and IT professionals who have passed some SUN certification exams are popular in IT industry. So more and more people participate in 310-301 certification exam, but 310-301 certification exam is not very simple. If you do not have participated in a professional specialized training course, you need to spend a lot of time and effort to prepare for the exam. But now IT-Tests.com can help you save a lot of your precious time and energy.
IT-Tests.com's SUN 310-301 exam training materials is the best training materials. If you are an IT staff, it will be your indispensable training materials. Do not take your future betting on tomorrow. IT-Tests.com's SUN 310-301 exam training materials are absolutely trustworthy. We are dedicated to provide the materials to the world of the candidates who want to participate in IT exam. To get the SUN 310-301 exam certification is the goal of many IT people & Network professionals. The pass rate of IT-Tests.com is incredibly high. We are committed to your success.
I believe that people want to have good prospects of career whatever industry they work in. Of course, there is no exception in the competitive IT industry. IT Professionals working in the IT area also want to have good opportunities for promotion of job and salary. A lot of IT professional know that SUN certification 310-301 exam can help you meet these aspirations. IT-Tests.com is a website which help you successfully pass SUN 310-301.
IT-Tests.com SUN 310-301 exam study guide can be a lighthouse in your career. Because it contains all 310-301 exam information. Select IT-Tests.com, it can help you to pass the exam. This is absolutely a wise decision. IT-Tests.com is your helper, you can get double the result, only need to pay half the effort.
Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 240 Questions and Answers
Last Update: 2014-01-20
The training tools of IT-Tests.com contains exam experience and materials which are come up with by our IT team of experts. Also we provide exam practice questions and answers about the SUN 310-301 exam certification. Our IT-Tests's high degree of credibility in the IT industry can provide 100% protection to you. In order to let you choose to buy our products more peace of mind, you can try to free download part of the exam practice questions and answers about SUN certification 310-301 exam online.
IT-Tests.com is a very good website for SUN certification 310-301 exams to provide convenience. According to the research of the past exam exercises and answers, IT-Tests.com can effectively capture the content of SUN certification 310-301 exam. IT-Tests's SUN 310-301 exam exercises have a very close similarity with real examination exercises.
310-301 (Sun Certified Security Administrator) Free Demo Download: http://www.it-tests.com/310-301.html
NO.1 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.2 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.3 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.4 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.5 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.6 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.7 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.8 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.9 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.10 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.11 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.12 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.13 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.14 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.15 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.16 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.17 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.18 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.19 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
NO.20 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C
SUN certification training 310-301 original questions 310-301 practice test 310-301 310-301 exam simulations
IT-Tests.com offer the latest C_TADM51_70 Questions & Answers and high-quality 1Y0-200 PDF Practice Test. Our JN0-694 VCE testing engine and 3107 study guide can help you pass the real exam. High-quality IIA-CIA-Part2 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.
Article Link: http://www.it-tests.com/310-301.html
没有评论:
发表评论