2013年12月23日星期一

Best SUN 310-301 test training guide

ITCertKing is a website which can give much convenience and meet the needs and achieve dreams for many people participating IT certification exams. If you are still worrying about passing some IT certification exams, please choose ITCertKing to help you. ITCertKing can make you feel at ease, because we have a lot of IT certification exam related training materials with high quality, coverage of the outline and pertinence, too, which will bring you a lot of help. You won't regret to choose ITCertKing, it can help you build your dream career.

In the such a brilliant era of IT industry in the 21st century competition is very fierce. Naturally, SUN certification 310-301 exam has become a very popular exam in the IT area. More and more people register for the exam and passing the certification exam is also those ambitious IT professionals' dream.

If you're still studying hard to pass the SUN 310-301 exam, ITCertKing help you to achieve your dream. We provide you with the best SUN 310-301 exam materials. It passed the test of practice, and with the best quality. It is better than SUN 310-301 tutorials and any other related materials. It can help you to pass the SUN 310-301 exam, and help you to become a strong IT expert.

Compared with other training materials, why ITCertKing's SUN 310-301 exam training materials is more welcomed by the majority of candidates? First, this is the problem of resonance. We truly understand the needs of the candidates, and comprehensively than any other site. Second, focus. In order to do the things we decided to complete, we have to give up all the unimportant opportunities. Third, the quality of the product. People always determine a good or bad thing based on the surface. We may have the best products of the highest quality, but if we shows it with a shoddy manner, it naturally will be as shoddy product. However, if we show it with both creative and professional manner, then we will get the best result. The ITCertKing's SUN 310-301 exam training materials is so successful training materials. It is most suitable for you, quickly select it please.

Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
One year free update, No help, Full refund!
Total Q&A: 240 Questions and Answers
Last Update: 2013-12-23

More and more people choose SUN 310-301 exam. Because of its popularity, you can use the ITCertKing SUN 310-301 exam questions and answers to pass the exam. This will bring you great convenience and comfort. This is a practice test website. It is available on the Internet with the exam questions and answers, as we all know, ITCertKing is the professional website which provide SUN 310-301 exam questions and answers.

ITCertKing exam dumps are written by IT elite who have more than ten years experience, through research and practice. ITCertKing provides you with the latest and the most accurate questions and answers. ITCertKing exists for your success. To choose ITCertKing is to choose your success. If you want to pass SUN 310-301 certification exam, ITCertKing is your unique choice.

ITCertKing SUN 310-301 dumps are validated by many more candidates, which can guarantee a high success rate. After you use our dumps, you still fail the exam so that ITCertKing will give you FULL REFUND. Or you can choose to free update your exam dumps. With such protections, you don't need to worry.

310-301 Free Demo Download: http://www.itcertking.com/310-301_exam.html

NO.1 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C

SUN   310-301   310-301   310-301   310-301

NO.2 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B

SUN   310-301   310-301   310-301   310-301

NO.3 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C

SUN   310-301   310-301   310-301   310-301

NO.4 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A

SUN   310-301   310-301   310-301   310-301

NO.5 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C

SUN   310-301   310-301   310-301   310-301

NO.6 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A

SUN   310-301   310-301   310-301   310-301

NO.7 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B

SUN   310-301   310-301   310-301   310-301

NO.8 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C

SUN   310-301   310-301   310-301   310-301

NO.9 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D

SUN   310-301   310-301   310-301   310-301

NO.10 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A

SUN   310-301   310-301   310-301   310-301

NO.11 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C

SUN   310-301   310-301   310-301   310-301

NO.12 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E

SUN   310-301   310-301   310-301   310-301

NO.13 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C

SUN   310-301   310-301   310-301   310-301

NO.14 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D

SUN   310-301   310-301   310-301   310-301

NO.15 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A

SUN   310-301   310-301   310-301   310-301

NO.16 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A

SUN   310-301   310-301   310-301   310-301

NO.17 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A

SUN   310-301   310-301   310-301   310-301

NO.18 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D

SUN   310-301   310-301   310-301   310-301

NO.19 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A

SUN   310-301   310-301   310-301   310-301

NO.20 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D

SUN   310-301   310-301   310-301   310-301

ITCertKing offer the latest 70-466 exam material and high-quality 700-410 pdf questions & answers. Our 200-101 VCE testing engine and C_TSCM62_65 study guide can help you pass the real exam. High-quality CTAL-TM_Syll2012 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/310-301_exam.html

没有评论:

发表评论