현재SUN 310-301인증시험을 위하여 노력하고 있습니까? 빠르게SUN인증 310-301시험자격증을 취득하고 싶으시다면 우리 ITExamDump 의 덤프를 선택하시면 됩니다,. ITExamDump를 선택함으로SUN 310-301인증시험패스는 꿈이 아닌 현실로 다가올 것입니다,
현재 경쟁울이 심한IT시대에,SUN 310-301자격증 취득만으로 이 경쟁이 심한 사회에서 자신만의위치를 보장할수 있고 더욱이는 한층업된 삶을 누릴수 있을수도 있습니다. 우리ITExamDump 에서 여러분은SUN 310-301관련 학습지도서를 얻을 수 있습니다. 우리ITExamDump는 IT업계엘리트 한 강사들이 퍼펙트한SUN 310-301문제집을 만들어서 제공합니다. 우리가 제공하는SUN 310-301문제와 답으로 여러분은 한번에 성공적으로 시험을 패스 하실수 있습니다. 중요한것 저희 문제집을 선택함으로 여러분의 시간도 절약해드리고 무엇보다도 많은 근심없이 심플하게 시험을 패스하여 좋다는 점입니다.
ITExamDump의 경험이 풍부한 전문가들이SUN 310-301인증시험관련자료들을 계획적으로 페펙트하게 만들었습니다.SUN 310-301인증시험응시에는 딱 좋은 자료들입니다. ITExamDump는 최고의 덤프만 제공합니다. 응시 전SUN 310-301인증시험덤프로 최고의 시험대비준비를 하시기 바랍니다.
최근 IT 업종에 종사하는 분들이 점점 늘어가는 추세하에 경쟁이 점점 치열해지고 있습니다. IT인증시험은 국제에서 인정받는 효력있는 자격증을 취득하는 과정으로서 널리 알려져 있습니다. ITExamDump의 SUN인증 310-301덤프는IT인증시험의 한 과목인 SUN인증 310-301시험에 대비하여 만들어진 시험전 공부자료인데 높은 시험적중율과 친근한 가격으로 많은 사랑을 받고 있습니다.
시험 번호/코드: 310-301
시험 이름: SUN (Sun Certified Security Administrator)
당신이 구입하기 전에 시도
일년동안 무료 업데이트
100% 환불보장약속
100% 합격율 보장
Q&A: 240 문항
업데이트: 2013-11-04
310-301 덤프무료샘플다운로드하기: http://www.itexamdump.com/310-301.html
NO.1 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.2 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.3 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.4 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.5 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.6 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.7 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.8 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.9 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.10 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.11 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.12 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.13 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.14 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.15 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.16 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.17 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.18 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.19 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
NO.20 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A
SUN dumps 310-301 310-301 310-301덤프 310-301최신덤프
ITexamdump의 000-540덤프의 VCE테스트프로그램과 ST0-202덤프는 한방에 시험을 패스하도록 도와드립니다. ITexamdump 에서는 최신버전의 LOT-441시험에 대비한 고품질 덤프와 ICBB시험 최신버전덤프를 제공해드립니다. 최고품질 700-101시험자료는 100% 간단하게 시험패스하도록 최선을 다하고 있습니다. IT인증시험패스는 이토록 간단합니다.
댓글 없음:
댓글 쓰기