2013年11月4日星期一

SUN 310-301 PDF

In the era of rapid development in the IT industry, we have to look at those IT people with new eyes. They use their high-end technology to create many convenient place for us. And save a lot of manpower and material resources for the state and enterprises. And even reached unimaginable effect. Of course, their income must be very high. Do you want to be the kind of person? Do you envy them? Or you are also IT person, but you do not get this kind of success. Do not worry, IT-Tests.com's SUN 310-301 exam material can help you to get what you want. To select IT-Tests.com is equivalent to choose a success.

Feedbacks of many IT professionals who have passed SUN certification 310-301 exam prove that their successes benefit from IT-Tests's help. IT-Tests's targeted test practice questions and answers to gave them great help, which save their valuable time and energy, and allow them to easily and smoothly pass their first SUN certification 310-301 exam. So IT-Tests.com a website worthy of your trust. Please select IT-Tests, you will be the next successful IT person. IT-Tests.com will help you achieve your dream.

If you are still study hard to prepare the SUN 310-301 exam, you're wrong. Of course, with studying hard, you can pass the exam. But may not be able to achieve the desired effect. Now this is the age of the Internet, there are a lot of shortcut to success. IT-Tests.com's SUN 310-301 exam training materials is a good training materials. It is targeted, and guarantee that you can pass the exam. This training matrial is not only have reasonable price, and will save you a lot of time. You can use the rest of your time to do more things. So that you can achieve a multiplier effect.

IT-Tests's providing training material is very close to the content of the formal examination. Through our short-term special training You can quickly grasp IT professional knowledge, and then have a good preparation for your exam. We promise that we will do our best to help you pass the SUN certification 310-301 exam.

IT-Tests.com is a very good website to provide a convenient service for the SUN certification 310-301 exam. IT-Tests's products can help people whose IT knowledge is not comprehensive pass the difficulty SUN certification 310-301 exam. If you add the SUN certification 310-301 exam product of IT-Tests.com to your cart, you will save a lot of time and effort. IT-Tests's product is developed by IT-Tests's experts' study of SUN certification 310-301 exam, and it is a high quality product.

Let me be clear here a core value problem of IT-Tests.com. All SUN exams are very important. In this era of rapid development of information technology, IT-Tests.com just one of the questions providers. Why do most people to choose IT-Tests.com ? Because the IT-Tests.com exam information will be able to help you pass the test. It provides the information which is up to date. With IT-Tests.com SUN 310-301 test questions, you will become full of confidence and not have to worry about the exam. However, it lets you get certified effortlessly.

Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 240 Questions and Answers
Last Update: 2013-11-04

Never say you can not do it. This is my advice to everyone. Even if you think that you can not pass the demanding SUN 310-301 exam. You can find a quick and convenient training tool to help you. IT-Tests.com's SUN 310-301 exam training materials is a very good training materials. It can help you to pass the exam successfully. And its price is very reasonable, you will benefit from it. So do not say you can't. If you do not give up, the next second is hope. Quickly grab your hope, itis in the IT-Tests.com's SUN 310-301 exam training materials.

310-301 (Sun Certified Security Administrator) Free Demo Download: http://www.it-tests.com/310-301.html

NO.1 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D

SUN test   310-301   310-301 test answers   310-301

NO.2 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A

SUN test   310-301   310-301 test answers   310-301

NO.3 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C

SUN test   310-301   310-301 test answers   310-301

NO.4 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D

SUN test   310-301   310-301 test answers   310-301

NO.5 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E

SUN test   310-301   310-301 test answers   310-301

NO.6 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A

SUN test   310-301   310-301 test answers   310-301

NO.7 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B

SUN test   310-301   310-301 test answers   310-301

NO.8 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C

SUN test   310-301   310-301 test answers   310-301

NO.9 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A

SUN test   310-301   310-301 test answers   310-301

NO.10 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A

SUN test   310-301   310-301 test answers   310-301

NO.11 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C

SUN test   310-301   310-301 test answers   310-301

NO.12 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C

SUN test   310-301   310-301 test answers   310-301

NO.13 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B

SUN test   310-301   310-301 test answers   310-301

NO.14 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A

SUN test   310-301   310-301 test answers   310-301

NO.15 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C

SUN test   310-301   310-301 test answers   310-301

NO.16 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A

SUN test   310-301   310-301 test answers   310-301

NO.17 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D

SUN test   310-301   310-301 test answers   310-301

NO.18 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C

SUN test   310-301   310-301 test answers   310-301

NO.19 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A

SUN test   310-301   310-301 test answers   310-301

NO.20 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D

SUN test   310-301   310-301 test answers   310-301

IT-Tests.com offer the latest 000-502 Questions & Answers and high-quality HP2-Z26 PDF Practice Test. Our 000-955 VCE testing engine and 00M-663 study guide can help you pass the real exam. High-quality 70-341 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.it-tests.com/310-301.html

没有评论:

发表评论