2014年1月28日星期二

SUN certification 310-301 exam training materials

SUN 310-301 certification exam is among those popular IT certifications. It is also the dream of ambitious IT professionals. This part of the candidates need to be fully prepared to allow them to get the highest score in the 310-301 exam, make their own configuration files compatible with market demand.

Pass4Test has been to make the greatest efforts to provide the best and most convenient service for our candidates. High speed and high efficiency are certainly the most important points. In today's society, high efficiency is hot topic everywhere. So we designed training materials which have hign efficiency for the majority of candidates. It allows candidates to grasp the knowledge quickly, and achieved excellent results in the exam. Pass4Test's SUN 310-301 exam training materials can help you to save a lot of time and effort. You can also use the extra time and effort to earn more money.

Pass4Test has a huge IT industry elite team. They all have high authority in the IT area. They use professional knowledge and experience to provide training materials for people ready to participate in different IT certification exams. The accuracy rate of exam practice questions and answers provided by Pass4Test is very high and they can 100% guarantee you pass the exam successfully for one time. Besides, we will provide you a free one-year update service.

Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
One year free update, No help, Full refund!
Total Q&A: 240 Questions and Answers
Last Update: 2014-01-28

We should use the most relaxed attitude to face all difficulties. Although SUN 310-301 exam is very difficult, but we candidates should use the most relaxed state of mind to face it. Because Pass4Test's SUN 310-301 exam training materials will help us to pass the exam successfully. With it, we would not be afraid, and will not be confused. Pass4Test's SUN 310-301 exam training materials is the best medicine for candidates.

Of course, when you are seeking for exam materials, it is certain that you will find many different materials. However, through investigation or personal experience, you will find Pass4Test questions and answers are the best ones for your need. The candidates have not enough time to prepare the exam, while Pass4Test certification training materials are to develop to solve the problem. So, it can save much time for us. What's more important, 100% guarantee to pass SUN 310-301 exam at the first attempt. In addition, Pass4Test exam dumps will be updated at any time. If exam outline and the content change, Pass4Test can provide you with the latest information.

Pass4Test is the door to success. Pass4Test SUN 310-301 test questions are very similar to the actual test. At the same time, our Pass4Test SUN 310-301 test questions and test answers are studied, based on the same syllabus. And we are also constantly upgrading our training materials. So, pass rate is 100% and high quality guarantee!

310-301 Free Demo Download: http://www.pass4test.com/310-301.html

NO.1 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.2 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.3 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.4 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.5 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.6 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.7 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.8 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.9 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.10 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.11 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.12 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.13 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.14 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.15 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.16 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.17 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.18 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.19 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A

SUN test answers   310-301 exam simulations   310-301 questions   310-301

NO.20 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D

SUN test answers   310-301 exam simulations   310-301 questions   310-301

Pass4Test offer the latest C4040-224 exam material and high-quality 74-325 pdf questions & answers. Our 3107 VCE testing engine and 000-278 study guide can help you pass the real exam. High-quality 70-461 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.pass4test.com/310-301.html

没有评论:

发表评论