Généralement, les experts n'arrêtent pas de rechercher les Q&As plus proches que test Certification. Les documentations offertes par les experts de Pass4Test peuvent vous aider à passer le test Certification. Les réponses de nos Q&As ont une précision 100%. C'est facile à obtenir le Certificat de SUN après d'utiliser la Q&A de Pass4Test. Vous aurez une space plus grande dans l'industrie IT.
Pass4Test vous offre un choix meilleur pour faire votre préparation de test SUN 310-301 plus éfficace. Si vous voulez réussir le test plus tôt, il ne faut que ajouter la Q&A de SUN 310-301 à votre cahier. Pass4Test serait votre guide pendant la préparation et vous permet à réussir le test SUN 310-301 sans aucun doute. Vous pouvez obtenir le Certificat comme vous voulez.
Code d'Examen: 310-301
Nom d'Examen: SUN (Sun Certified Security Administrator)
Questions et réponses: 240 Q&As
Différentes façons peuvent atteindre le même but, ça dépend laquelle que vous prenez. Beaucoup de gens choisissent le test SUN 310-301 pour améliorer la vie et la carrière. Mais tous les gens ont déjà participé le test SUN 310-301, ils savent qu'il est difficile à réussir le test. Il y a quelques dépensent le temps et l'argent, mais ratent finalement.
Participer au test SUN 310-301 est un bon choix, parce que dans l'Industire IT, beaucoup de gens tirent un point de vue que le Certificat SUN 310-301 symbole bien la professionnalité d'un travailleur dans cette industrie.
310-301 Démo gratuit à télécharger: http://www.pass4test.fr/310-301.html
NO.1 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.2 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.3 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.4 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.5 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.6 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.7 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.8 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.9 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.10 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.11 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.12 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.13 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.14 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.15 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.16 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.17 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.18 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.19 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
NO.20 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C
SUN examen 310-301 certification 310-301 certification 310-301 310-301 examen
Pass4Test est aussi un site d'offrir la ressource des connaissances pour le test Certification IT. Selon les Feedbacks venus de gens qui ont untilié les produits de Pass4Test, Pass4Test est un site fiable comme l'outil de se former. Les Q&As offertes par Pass4Test sont bien précises. Les experts de Pass4Test mettent à jour nos documentations de formation de temps de temps.
没有评论:
发表评论