In today's competitive IT industry, passing SUN certification 310-301 exam has a lot of benefits. Gaining SUN 310-301 certification can increase your salary. People who have got SUN 310-301 certification often have much higher salary than counterparts who don't have the certificate. But SUN certification 310-301 exam is not very easy, so ITCertKing is a website that can help you grow your salary.
Many candidates who are ready to participate in the SUN certification 310-301 exam may see many websites available online to provide resources about SUN certification 310-301 exam. However, ITCertKing is the only website whose exam practice questions and answers are developed by a study of the leading IT experts's reference materials. The information of ITCertKing can ensure you pass your first time to participate in the SUN certification 310-301 exam.
Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
One year free update, No help, Full refund!
Total Q&A: 240 Questions and Answers
Last Update: 2013-10-15
ITCertKing provide you the product with high quality and reliability. You can free download online part of ITCertKing's providing practice questions and answers about the SUN certification 310-301 exam as a try. After your trail I believe you will be very satisfied with our product. Such a good product which can help you pass the exam successfully, what are you waiting for? Please add it to your shopping cart.
I believe that a lot of people working in the IT industry hope to pass some IT certification exams to obtain the corresponding certifications. Some IT authentication certificates can help you promote to a higher job position in this fiercely competitive IT industry. Now the very popular SUN 310-301 authentication certificate is one of them. Although passing the SUN certification 310-301 exam is not so easy, there are still many ways to help you successfully pass the exam. While you can choose to spend a lot of time and energy to review the related IT knowledge, and also you can choose a effective training course. ITCertKing can provide the pertinent simulation test,which is very effective to help you pass the exam and can save your precious time and energy to achieve your dream. ITCertKing will be your best choice.
310-301 certification exam is a very import component SUN certification exam. But passing SUN certification 310-301 exam is not so simple. In order to give to relieve pressure and save time and effort for candidates who take a preparation for the 310-301 certification exam, ITCertKing specially produce a variety of training tools. So you can choose an appropriate quick training from ITCertKing to pass the exam.
Everyone has their own life planning. Different selects will have different acquisition. So the choice is important. ITCertKing's SUN 310-301 exam training materials are the best things to help each IT worker to achieve the ambitious goal of his life. It includes questions and answers, and issimilar with the real exam questions. This really can be called the best training materials.
Add ITCertKing's products to cart now! You will have 100% confidence to participate in the exam and disposably pass SUN certification 310-301 exam. At last, you will not regret your choice.
310-301 Free Demo Download: http://www.itcertking.com/310-301_exam.html
NO.1 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E
SUN practice test 310-301 310-301 310-301
NO.2 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D
SUN practice test 310-301 310-301 310-301
NO.3 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C
SUN practice test 310-301 310-301 310-301
NO.4 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A
SUN practice test 310-301 310-301 310-301
NO.5 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C
SUN practice test 310-301 310-301 310-301
NO.6 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D
SUN practice test 310-301 310-301 310-301
NO.7 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B
SUN practice test 310-301 310-301 310-301
NO.8 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B
SUN practice test 310-301 310-301 310-301
NO.9 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C
SUN practice test 310-301 310-301 310-301
NO.10 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C
SUN practice test 310-301 310-301 310-301
NO.11 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A
SUN practice test 310-301 310-301 310-301
NO.12 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A
SUN practice test 310-301 310-301 310-301
NO.13 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A
SUN practice test 310-301 310-301 310-301
NO.14 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C
SUN practice test 310-301 310-301 310-301
NO.15 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A
SUN practice test 310-301 310-301 310-301
NO.16 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C
SUN practice test 310-301 310-301 310-301
NO.17 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A
SUN practice test 310-301 310-301 310-301
NO.18 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D
SUN practice test 310-301 310-301 310-301
NO.19 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A
SUN practice test 310-301 310-301 310-301
NO.20 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D
SUN practice test 310-301 310-301 310-301
ITCertKing offer the latest E20-554 exam material and high-quality 000-783 pdf questions & answers. Our 70-464 VCE testing engine and 70-466 study guide can help you pass the real exam. High-quality CUR-009 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.
Article Link: http://www.itcertking.com/310-301_exam.html
没有评论:
发表评论