2014년 3월 17일 월요일

SUN 310-301 덤프데모

SUN 310-301 시험을 어떻게 통과할수 있을가 고민중이신 분들은ITExamDump를 선택해 주세요. ITExamDump는 많은 분들이 IT인증시험을 응시하여 성공하도록 도와주는 사이트입니다. 최고급 품질의SUN 310-301시험대비 덤프는SUN 310-301시험을 간단하게 패스하도록 힘이 되어드립니다. ITExamDump 의 덤프는 모두 엘리트한 전문가들이 만들어낸 만큼 시험문제의 적중률은 아주 높습니다.

영어가 서툴러 국제승인 인기 IT인증자격증 필수시험 과목인SUN인증 310-301시험에 도전할 엄두도 낼수 없다구요? 이런 생각은 이글을 보는 순간 버리세요. SUN인증 310-301시험을 패스하려면ITExamDump가 고객님의 곁을 지켜드립니다. ITExamDump의SUN인증 310-301덤프는 SUN인증 310-301시험패스 특효약입니다. 영어가 서툴러고 덤프범위안의 문제만 기억하면 되기에 영어로 인한 문제는 걱정하지 않으셔도 됩니다.

ITExamDump의SUN인증 310-301덤프를 공부하시면 한방에 시험을 패스하는건 문제가 아닙니다. ITExamDump의SUN인증 310-301덤프는 시험적중율 최고의 인지도를 넓히 알리고 있습니다.저희가 제공한 시험예상문제로 시험에 도전해보지 않으실래요? SUN인증 310-301덤프를 선택하시면 성공의 지름길이 눈앞에 다가옵니다.

시험 번호/코드: 310-301
시험 이름: SUN (Sun Certified Security Administrator)
당신이 구입하기 전에 시도
일년동안 무료 업데이트
100% 환불보장약속
100% 합격율 보장
Q&A: 240 문항
업데이트: 2014-03-16

ITExamDump는SUN인증310-301시험에 대하여 가이드를 해줄 수 있는 사이트입니다. ITExamDump는 여러분의 전업지식을 업그레이드시켜줄 수 잇고 또한 한번에SUN인증310-301시험을 패스하도록 도와주는 사이트입니다. ITExamDump제공하는 자료들은 모두 it업계전문가들이 자신의 지식과 끈임없은 경헌등으로 만들어낸 퍼펙트 자료들입니다. 품질은 정확도 모두 보장되는 문제집입니다.SUN인증310-301시험은 여러분이 it지식을 한층 업할수 잇는 시험이며 우리 또한 일년무료 업데이트서비스를 제공합니다.

310-301 덤프무료샘플다운로드하기: http://www.itexamdump.com/310-301.html

NO.1 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.2 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.3 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.4 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.5 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.6 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.7 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.8 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.9 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.10 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.11 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.12 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.13 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.14 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.15 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.16 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.17 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.18 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.19 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

NO.20 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D

SUN시험문제   310-301 pdf   310-301덤프   310-301 dumps

ITexamdump의 000-501덤프의 VCE테스트프로그램과 1Z1-061덤프는 한방에 시험을 패스하도록 도와드립니다. ITexamdump 에서는 최신버전의 CTAL-TM_Syll2012시험에 대비한 고품질 덤프와 74-324시험 최신버전덤프를 제공해드립니다. 최고품질 1z0-457시험자료는 100% 간단하게 시험패스하도록 최선을 다하고 있습니다. IT인증시험패스는 이토록 간단합니다.

시험자료링크: http://www.itexamdump.com/310-301.html

댓글 없음:

댓글 쓰기