2013년 12월 13일 금요일

SUN 310-301 인증시험

ITExamDump는 여러분을 성공으로 가는 길에 도움을 드리는 사이트입니다. ITExamDump에서는 여러분이 안전하게 간단하게SUN인증310-301시험을 패스할 수 있는 자료들을 제공함으로 빠른 시일 내에 IT관련지식을 터득하고 한번에 시험을 패스하실 수 있습니다.

ITExamDump는 믿을 수 있는 사이트입니다. IT업계에서는 이미 많이 알려져 있습니다. 그리고 여러분에 신뢰를 드리기 위하여 SUN 인증310-301 관련자료의 일부분 문제와 답 등 샘플을 무료로 다운받아 체험해볼 수 있게 제공합니다. 아주 만족할 것이라고 믿습니다. ITExamDump제품에 대하여 아주 자신이 있습니다. SUN 인증310-301 도 여러분의 무용지물이 아닌 아주 중요한 자료가 되리라 믿습니다. 여러분께서는 아주 순조로이 시험을 패스하실 수 있을 것입니다.

시험 번호/코드: 310-301
시험 이름: SUN (Sun Certified Security Administrator)
당신이 구입하기 전에 시도
일년동안 무료 업데이트
100% 환불보장약속
100% 합격율 보장
Q&A: 240 문항
업데이트: 2013-12-12

지금 같은 경쟁력이 심각한 상황에서SUN 310-301시험자격증만 소지한다면 연봉상승 등 일상생활에서 많은 도움이 될 것입니다.SUN 310-301시험자격증 소지자들의 연봉은 당연히SUN 310-301시험자격증이 없는 분들보다 높습니다. 하지만 문제는SUN 310-301시험패스하기가 너무 힘듭니다. ITExamDump는 여러분의 연봉상승을 도와 드리겠습니다.

IT업계에서 자신만의 위치를 찾으려면 자격증을 많이 취득하는것이 큰 도움이 될것입니다. SUN 인증 310-301시험은 아주 유용한 시험입니다. SUN 인증310-301시험출제경향을 퍼펙트하게 연구하여ITExamDump에서는SUN 인증310-301시험대비덤프를 출시하였습니다. ITExamDump에서 제공해드리는SUN 인증310-301시험덤프는 시장에서 판매하고 있는SUN 인증310-301덤프중 가장 최신버전덤프로서 덤프에 있는 문제만 공부하시면 시험통과가 쉬워집니다.

IT인증자격증을 취득하려고 마음먹었으면 끝까지 도전해봐야 합니다. SUN인증 310-301시험이 아무리 어려워도ITExamDump의SUN인증 310-301덤프가 동반해주면 시험이 쉬워지는 법은 많이 알려져 있습니다. ITExamDump의SUN인증 310-301덤프는 100% 패스보장 가능한 덤프자료입니다.한번만 믿어주시고ITExamDump제품으로 가면 시험패스는 식은 죽 먹기처럼 간단합니다.

310-301 덤프무료샘플다운로드하기: http://www.itexamdump.com/310-301.html

NO.1 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.2 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.3 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.4 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.5 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.6 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.7 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.8 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.9 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.10 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.11 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.12 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.13 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.14 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.15 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.16 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.17 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.18 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.19 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

NO.20 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D

SUN pdf   310-301시험문제   310-301 pdf   310-301   310-301자격증

ITexamdump의 70-561덤프의 VCE테스트프로그램과 000-303덤프는 한방에 시험을 패스하도록 도와드립니다. ITexamdump 에서는 최신버전의 646-048시험에 대비한 고품질 덤프와 C_TSCM62_65시험 최신버전덤프를 제공해드립니다. 최고품질 1Z0-060시험자료는 100% 간단하게 시험패스하도록 최선을 다하고 있습니다. IT인증시험패스는 이토록 간단합니다.

시험자료링크: http://www.itexamdump.com/310-301.html

댓글 없음:

댓글 쓰기