As we all know, ITCertKing's SUN 310-301 exam training materials has very high profile, and it is also well-known in the worldwide. Why it produces such a big chain reaction? This is because ITCertKing's SUN 310-301 exam training materials is is really good. And it really can help us to achieve excellent results.
SUN 310-301 exam is a Technical Specialist exam. SUN 310-301 exam can help and promote IT staff have a good career. With a good career, and of course you can create a steady stream of corporate and national interests, so as to promote the development of the national economy. If all of the IT staff can do like this the state will become stronger. ITCertKing SUN 310-301 exam training materials can help IT personnel to achieve this purpose. We guarantee you 100% to pass the exam. Make the tough decision to choose our ITCertKing SUN 310-301 exam training materials please.
ITCertKing SUN 310-301 exam training materials are provided in PDF format and software format. It contains SUN 310-301 exam questions and answers. These issues are perfect, Which can help you to be successful in the SUN 310-301 exam. ITCertKing SUN 310-301 exam comprehensively covers all syllabus and complex issues. The ITCertKing SUN 310-301 exam questions and answers is the real exam challenges, and help you change your mindset.
Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
One year free update, No help, Full refund!
Total Q&A: 240 Questions and Answers
Last Update: 2013-10-14
ITCertKing's SUN 310-301 exam training materials are the necessities of each of candidates who participating in the IT certification. With this training material, you can do a full exam preparation. So that you will have the confidence to win the exam. ITCertKing's SUN 310-301 exam training materials are highly targeted. Not every training materials on the Internet have such high quality. Only ITCertKing could be so perfect.
If you feel that you purchase ITCertKing SUN 310-301 exam training materials, and use it to prepare for the exam is an adventure, then the whole of life is an adventure. Gone the furthest person is who are willing to do it and willing to take risks. Not to mention that ITCertKing SUN 310-301 exam training materials are many candidates proved in practice. It brings the success of each candidate is also real and effective. Dreams and hopes are important, but more important is to go to practice and prove. The ITCertKing SUN 310-301 exam training materials will be successful, select it, you have no reason unsuccessful !
310-301 Free Demo Download: http://www.itcertking.com/310-301_exam.html
NO.1 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.2 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.3 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.4 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.5 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.6 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.7 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.8 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.9 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.10 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.11 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.12 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.13 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.14 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.15 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.16 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.17 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.18 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.19 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
NO.20 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A
SUN answers real questions 310-301 exam 310-301 demo 310-301 exam simulations 310-301 braindump
ITCertKing offer the latest HP3-C29 exam material and high-quality JN0-533 pdf questions & answers. Our CAT-380 VCE testing engine and NS0-156 study guide can help you pass the real exam. High-quality 74-344 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.
Article Link: http://www.itcertking.com/310-301_exam.html
没有评论:
发表评论