2013年11月26日星期二

ITCertKing provides training on SUN 310-301 exam materials

ITCertKing is an excellent IT certification examination information website. In ITCertKing you can find exam tips and materials about SUN certification 310-301 exam. You can also free download part of examination questions and answers about SUN 310-301 in ITCertKing. ITCertKing will timely provide you free updates about SUN 310-301 exam materials. Besides, the exam materials we sold are to provide the answers. Our IT experts team will continue to take advantage of professional experience to come up with accurate and detailed exam practice questions to help you pass the exam. In short, we will provide you with everything you need about SUN certification 310-301 exam.

In this competitive society, being good at something is able to take up a large advantage, especially in the IT industry. Gaining some IT authentication certificate is very useful. SUN 310-301 is a certification exam to test the IT professional knowledge level and has a Pivotal position in the IT industry. While SUN 310-301 exam is very difficult to pass, so in order to pass the SUN certification 310-301 exam a lot of people spend a lot of time and effort to learn the related knowledge, but in the end most of them do not succeed. Therefore ITCertKing is to analyze the reasons for their failure. The conclusion is that they do not take a pertinent training course. Now ITCertKing experts have developed a pertinent training program for SUN certification 310-301 exam, which can help you spend a small amount of time and money and 100% pass the exam at the same time.

Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
One year free update, No help, Full refund!
Total Q&A: 240 Questions and Answers
Last Update: 2013-11-26

In order to meet the request of current real test, the technology team of research on ITCertKing SUN 310-301 exam materials is always update the questions and answers in time. We always accept feedbacks from users, and take many of the good recommendations, resulting in a perfect ITCertKing SUN 310-301 exam materials. This allows ITCertKing to always have the materials of highest quality.

ITCertKing has a huge team of IT experts, who continue to use their knowledge and experience to study a lot of IT certification examination papers of past few years. Their findings of the research is now the product of ITCertKing, therefore ITCertKing's SUN 310-301 practice questions are very similar with the real exam, which can help a lot of people to realize their dreams. ITCertKing can ensure you to successfully pass the exam, and you can boldly Add ITCertKing's products to your shopping cart. With ITCertKing your dreams can be achieved immediately.

Are you still worrying about how to safely pass SUN certification 310-301 exams? Do you have thought to select a specific training? Choosing a good training can effectively help you quickly consolidate a lot of IT knowledge, so you can be well ready for SUN certification 310-301 exam. ITCertKing's expert team used their experience and knowledge unremitting efforts to do research of the previous years exam, and finally have developed the best pertinence training program about SUN certification 310-301 exam. Our training program can effectively help you have a good preparation for SUN certification 310-301 exam. ITCertKing's training program will be your best choice.

310-301 Free Demo Download: http://www.itcertking.com/310-301_exam.html

NO.1 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B

SUN test answers   310-301 exam prep   310-301   310-301

NO.2 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A

SUN test answers   310-301 exam prep   310-301   310-301

NO.3 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E

SUN test answers   310-301 exam prep   310-301   310-301

NO.4 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D

SUN test answers   310-301 exam prep   310-301   310-301

NO.5 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D

SUN test answers   310-301 exam prep   310-301   310-301

NO.6 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D

SUN test answers   310-301 exam prep   310-301   310-301

NO.7 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A

SUN test answers   310-301 exam prep   310-301   310-301

NO.8 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C

SUN test answers   310-301 exam prep   310-301   310-301

NO.9 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C

SUN test answers   310-301 exam prep   310-301   310-301

NO.10 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A

SUN test answers   310-301 exam prep   310-301   310-301

NO.11 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C

SUN test answers   310-301 exam prep   310-301   310-301

NO.12 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C

SUN test answers   310-301 exam prep   310-301   310-301

NO.13 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B

SUN test answers   310-301 exam prep   310-301   310-301

NO.14 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A

SUN test answers   310-301 exam prep   310-301   310-301

NO.15 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C

SUN test answers   310-301 exam prep   310-301   310-301

NO.16 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A

SUN test answers   310-301 exam prep   310-301   310-301

NO.17 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A

SUN test answers   310-301 exam prep   310-301   310-301

NO.18 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C

SUN test answers   310-301 exam prep   310-301   310-301

NO.19 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A

SUN test answers   310-301 exam prep   310-301   310-301

NO.20 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D

SUN test answers   310-301 exam prep   310-301   310-301

ITCertKing offer the latest HP2-E58 exam material and high-quality 1Z1-536 pdf questions & answers. Our 000-089 VCE testing engine and LOT-406 study guide can help you pass the real exam. High-quality 70-464 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/310-301_exam.html

没有评论:

发表评论