2013年7月12日星期五

The best of SUN certification 310-301 exam training methods

The trouble can test a person's character. A bad situation can show special integrity. When to face of a difficult time, only the bravest people could take it easy. Are you a brave person? If you did not do the best preparation for your IT certification exam, can you take it easy? Yes, of course. Because you have IT-Tests.com's SUN 310-301 exam training materials. As long as you have it, any examination do not will knock you down.


IT-Tests.com is a professional website to specially provide training tools for IT certification exams and a good choice to help you pass 310-301 exam,too. IT-Tests.com provide exam materials about 310-301 certification exam for you to consolidate learning opportunities. IT-Tests.com will provide all the latest and accurate exam practice questions and answers for the staff to participate in 310-301 certification exam.


Practice what you preach is the beginning of success. Since you have chosen to participate in the demanding IT certification exam. Then you have to pay your actions, and achieve excellent results. IT-Tests.com's SUN 310-301 exam training materials are the best training materials for this exam. With it you will have a key to success. IT-Tests.com's SUN 310-301 exam training materials are absolutely reliable materials. You should believe that you can pass the exam easily , too.


Exam Code: 310-301

Exam Name: SUN (Sun Certified Security Administrator)

IT-Tests.com is a website to provide a targeted training for SUN certification 310-301 exam. IT-Tests.com is also a website which can not only make your expertise to get promoted, but also help you pass SUN certification 310-301 exam for just one time. The training materials of IT-Tests.com are developed by many IT experts' continuously using their experience and knowledge to study, and the quality is very good and have very high accuracy. Once you select our IT-Tests, we can not only help you pass SUN certification 310-301 exam and consolidate their IT expertise, but also have a one-year free after-sale Update Service.


If you still desperately cram knowledge and spend a lot of precious time and energy to prepare for passing SUN certification 310-301 exam, and at the same time do not know how to choose a more effective shortcut to pass SUN certification 310-301 exam. Now IT-Tests.com provide you a effective method to pass SUN certification 310-301 exam. It will play a multiplier effect to help you pass the exam.


310-301 (Sun Certified Security Administrator) Free Demo Download: http://www.it-tests.com/310-301.html


NO.1 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.2 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.3 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.4 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.5 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.6 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.7 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.8 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.9 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.10 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.11 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.12 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.13 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.14 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.15 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.16 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.17 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.18 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.19 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C

SUN demo   310-301   310-301   310-301   310-301 dumps

NO.20 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A

SUN demo   310-301   310-301   310-301   310-301 dumps

Fantasy can make people to come up with many good ideas, but it can not do anything. So when you thinking how to pass the SUN 310-301 exam, It's better open your computer, and click the website of IT-Tests.com, then you will see the things you want. IT-Tests.com's products have favorable prices, and have quality assurance, but also to ensure you to 100% pass the exam.


没有评论:

发表评论