310-301는SUN의 인증시험입니다.310-301인증시험을 패스하면SUN인증과 한 발작 더 내디딘 것입니다. 때문에310-301시험의 인기는 날마다 더해갑니다.310-301시험에 응시하는 분들도 날마다 더 많아지고 있습니다. 하지만310-301시험의 통과 율은 아주 낮습니다.310-301인증시험준비중인 여러분은 어떤 자료를 준비하였나요?
SUN인증310-301시험준비를 하고 계시다면ITExamDump에서 출시한SUN인증310-301덤프를 제일 먼저 추천해드리고 싶습니다. ITExamDump제품은 여러분들이 제일 간편한 방법으로 시험에서 고득점을 받을수 있도록 도와드리는 시험동반자입니다. SUN인증310-301시험패는ITExamDump제품으로 고고고!
시험 번호/코드: 310-301
시험 이름: SUN (Sun Certified Security Administrator)
당신이 구입하기 전에 시도
일년동안 무료 업데이트
100% 환불보장약속
100% 합격율 보장
Q&A: 240 문항
업데이트: 2013-09-22
ITExamDump는 여러분의 꿈을 이루어줄 뿐만 아니라 일년무료 업뎃서비스도 따릅니다. ITExamDump에서 제공하는 덤프로 여러분은 1000%시험을 패스하실수 있고SUN 310-301자격증을 취득하실 수 있습니다.지금 바로 사이트에서SUN 310-301덤프데모 즉 덤프의 일부 문제와 답을 다운 받으셔서 체험하실 수 있습니다.
ITExamDump는 많은 IT인사들이SUN인증시험에 참가하고 완벽한310-301인증시험자료로 응시하여 안전하게SUN 310-301인증시험자격증 취득하게 하는 사이트입니다. Pass4Tes의 자료들은 모두 우리의 전문가들이 연구와 노력 하에 만들어진 것이며.그들은 자기만의 지식과 몇 년간의 연구 경험으로 퍼펙트하게 만들었습니다.우리 덤프들은 품질은 보장하며 갱신 또한 아주 빠릅니다.우리의 덤프는 모두 실제시험과 유사하거나 혹은 같은 문제들임을 약속합니다.ITExamDump는 100% 한번에 꼭 고난의도인SUN인증310-301시험을 패스하여 여러분의 사업에 많은 도움을 드리겠습니다.
우리ITExamDump에는 아주 엘리트한 전문가들로 구성된 팀입니다. 우리는 아주 정확하게 또한 아주 신속히SUN 310-301관한 자료를 제공하며, 업데이트될경우 또한 아주 빠르게 뉴버전을 여러분한테 보내드립니다. ITExamDump는 관련업계에서도 우리만의 브랜드이미지를 지니고 있으며 많은 고객들의 찬사를 받았습니다. 현재SUN 310-301인증시험패스는 아주 어렵습니다, 하지만 ITExamDump의 자료로 충분히 시험 패스할 수 있습니다.
310-301 덤프무료샘플다운로드하기: http://www.itexamdump.com/310-301.html
NO.1 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.2 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.3 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.4 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.5 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.6 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.7 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.8 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.9 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.10 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.11 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.12 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.13 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.14 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.15 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.16 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.17 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.18 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.19 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D
SUN인증 310-301기출문제 310-301 pdf 310-301
NO.20 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D
SUN인증 310-301기출문제 310-301 pdf 310-301
ITexamdump의 700-104덤프의 VCE테스트프로그램과 70-684덤프는 한방에 시험을 패스하도록 도와드립니다. ITexamdump 에서는 최신버전의 000-656시험에 대비한 고품질 덤프와 HH0-240시험 최신버전덤프를 제공해드립니다. 최고품질 HP2-B103시험자료는 100% 간단하게 시험패스하도록 최선을 다하고 있습니다. IT인증시험패스는 이토록 간단합니다.
댓글 없음:
댓글 쓰기