Now IT industry is more and more competitive. Passing SUN 310-301 exam certification can effectively help you entrench yourself and enhance your status in this competitive IT area. In our DumpLeader you can get the related SUN 310-301 exam certification training tools. Our DumpLeader IT experts team will timely provide you the accurate and detailed training materials about SUN certification 310-301 exam. Through the learning materials and exam practice questions and answers provided by DumpLeader, we can ensure you have a successful challenge when you are the first time to participate in the SUN certification 310-301 exam. Above all, using DumpLeader you do not spend a lot of time and effort to prepare for the exam.
Life is full of choices. Selection does not necessarily bring you happiness, but to give you absolute opportunity. Once missed selection can only regret. DumpLeader's SUN 310-301 exam training materials are necessary to every IT person. With this materials, all of the problems about the SUN 310-301 will be solved. DumpLeader's SUN 310-301 exam training materials have wide coverage, and update speed. This is the most comprehensive training materials. With it, all the IT certifications need not fear, because you will pass the exam.
Passing 310-301 exam is not very simple. 310-301 exam requires a high degree of professional knowledge of IT, and if you lack this knowledge, DumpLeader can provide you with a source of IT knowledge. DumpLeader's expert team will use their wealth of expertise and experience to help you increase your knowledge, and can provide you practice questions and answers 310-301 certification exam. DumpLeader will not only do our best to help you pass the 310-301 certification exam for only one time, but also help you consolidate your IT expertise. If you select DumpLeader, we can not only guarantee you 100% pass 310-301 certification exam, but also provide you with a free year of exam practice questions and answers update service. And if you fail to pass the examination carelessly, we can guarantee that we will immediately 100% refund your cost to you.
Your dream is very high, so you have to find a lot of material to help you prepare for the exam. DumpLeader SUN 310-301 exam materials can help you to achieve your ideal. DumpLeader SUN 310-301 exam materials is a collection of experience and innovation from highly certified IT professionals in the field. Our products will let you try all the problems that may arise in a really examinations. We can give you a guarantee, to ensure that candidates get a 100% correct answer.
DumpLeader have a professional IT team to do research for practice questions and answers of the SUN 310-301 exam certification exam. They provide a very effective training tools and online services for your. If you want to buy DumpLeader products, DumpLeader will provide you with the latest, the best quality and very detailed training materials as well as a very accurate exam practice questions and answers to be fully prepared for you to participate in the SUN certification 310-301 exam. Safely use the questions provided by DumpLeader's products. Selecting the DumpLeader is equal to be 100% passing the exam.
Exam Code: 310-301
Exam Name: SUN (Sun Certified Security Administrator)
One year free update, No help, Full refund!
Total Q&A: 240 Questions and Answers
Last Update: 2013-11-02
310-301 Free Demo Download: http://www.dumpleader.com/310-301_exam.html
NO.1 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A
SUN 310-301 exam simulations 310-301 exam
NO.2 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C
SUN 310-301 exam simulations 310-301 exam
NO.3 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D
SUN 310-301 exam simulations 310-301 exam
NO.4 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D
SUN 310-301 exam simulations 310-301 exam
NO.5 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E
SUN 310-301 exam simulations 310-301 exam
NO.6 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A
SUN 310-301 exam simulations 310-301 exam
NO.7 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A
SUN 310-301 exam simulations 310-301 exam
NO.8 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C
SUN 310-301 exam simulations 310-301 exam
NO.9 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C
SUN 310-301 exam simulations 310-301 exam
NO.10 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A
SUN 310-301 exam simulations 310-301 exam
NO.11 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A
SUN 310-301 exam simulations 310-301 exam
NO.12 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D
SUN 310-301 exam simulations 310-301 exam
NO.13 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C
SUN 310-301 exam simulations 310-301 exam
NO.14 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C
SUN 310-301 exam simulations 310-301 exam
NO.15 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A
SUN 310-301 exam simulations 310-301 exam
NO.16 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A
SUN 310-301 exam simulations 310-301 exam
NO.17 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B
SUN 310-301 exam simulations 310-301 exam
NO.18 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C
SUN 310-301 exam simulations 310-301 exam
NO.19 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D
SUN 310-301 exam simulations 310-301 exam
NO.20 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B
SUN 310-301 exam simulations 310-301 exam
DumpLeader offer the latest CUR-009 exam material and high-quality 000-593 pdf questions & answers. Our 700-104 VCE testing engine and 70-492 study guide can help you pass the real exam. High-quality HP2-K34 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.
Article Link: http://www.dumpleader.com/310-301_exam.html
没有评论:
发表评论