2013年11月22日星期五

難しいSUN 310-301認定試験に対応する対策

JapanCertが提供した教育資料は真実のテストに非常に近くて、あなたが弊社の短期の特殊訓練問題を通じてすぐにIT専門の知識を身につけられます。弊社は君の試験の100%合格率を保証いたします。

Pass4Tesを通じて最新のSUNの310-301試験の問題と解答早めにを持てて、弊社の問題集があればきっと君の強い力になります。

JapanCertはたくさんの方がIT者になる夢を実現させるサイトでございます。JapanCertはSUNの310-301認証試験について最新の対応性教育テストツールを研究し続けて、SUNの310-301認定試験の問題集を開発いたしました。JapanCertが提供したSUNの310-301試験問題と解答が真実の試験の練習問題と解答は最高の相似性があり、一年の無料オンラインの更新のサービスがあり、100%のパス率を保証して、もし試験に合格しないと、弊社は全額で返金いたします。

成功した方法を見つけるだけで、失敗の言い訳をしないでください。SUNの310-301試験に受かるのは実際にそんなに難しいことではないです。大切なのはあなたがどんな方法を使うかということです。JapanCertのSUNの310-301試験トレーニング資料はよい選択で、あなたが首尾よく試験に合格することを助けられます。これも成功へのショートカットです。誰もが成功する可能性があって、大切なのは選択することです。

JapanCertは受験生の皆様に最も良いかつ便利なサービスを提供できるようにずっと一生懸命頑張っています。現在の時代で高効率は避けられない話題ですから、速いスピードと高効率が我々の目標です。受験の皆さんは速く知識を理解して高い点数を取得できるようにJapanCertは効率的なトレーニング資料をデザインしてさしあげます。皆さんは節約した時間とエネルギーを利用してもっと多くの金銭を稼ぐことができます。

試験番号:310-301問題集
試験科目:SUN 「Sun Certified Security Administrator」
最近更新時間:2013-11-21
問題と解答:240

購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.japancert.com/310-301.html

NO.1 Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A.AES
B.RSA
C.DSA
D.DES
E.3DES
Correct:B C

SUN   310-301   310-301   310-301認証試験

NO.2 Which command can customize the size for system log file rotation?
A.dmesg
B.logger
C.logadm
D.syslog
E.syslogd
Correct:C

SUN   310-301   310-301   310-301認証試験

NO.3 Which syslog facility level specification can be used to record unsuccessful attempts to su(1M)?
A.su.warning
B.cron.debug
C.kernel.alert
D.auth.warning
Correct:D

SUN   310-301   310-301   310-301認証試験

NO.4 Which cryptographic assurances are provided by SSL?
A.confidentiality, integrity, availability
B.authorization, confidentiality, message integrity
C.confidentiality, client authentication, server authentication
D.authentication, confidentiality, access control, non-repudiation
Correct:C

SUN   310-301   310-301   310-301認証試験

NO.5 /var/adm/messages contains this output: Jan 28 21:23:18 mailhost in.telnetd[20911]: [ID 808958
daemon.warning] refused connect from ns.foo.com (access denied) Why was this line generated?
A.A user connecting from ns.foo.com failed to authenticate.
B.The user daemon is not allowed to log in from ns.foo.com.
C.A portscan was run against mailhost from ns.foo.com.
D.The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Correct:D

SUN   310-301   310-301   310-301認証試験

NO.6 Which evasion technique can NOT be detected by system integrity checks?
A.installing a rootkit
B.adding user accounts
C.abusing an existing user account
D.installing a loadable kernel module
Correct:C

SUN   310-301   310-301   310-301認証試験

NO.7 User fred runs a program that consumes all of the system's memory while continuously
spawning a new program. You decide to terminate all of fred's programs to put a stop to this. What
command should you use?
A.kill -u fred
B.pkill -U fred
C.passwd -l fred
D.kill `ps -U fred -o pid`
Correct:B

SUN   310-301   310-301   310-301認証試験

NO.8 Which is a public key encryption algorithm?
A.AH
B.AES
C.RSA
D.PGP
E.IDEA
Correct:C

SUN   310-301   310-301   310-301認証試験

NO.9 Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A.system panics
B.booting into single user mode
C.remotely accessing the console
D.logging in as root at the console
Correct:B

SUN   310-301   310-301   310-301認証試験

NO.10 Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A.inetd
B.rpcbind
C.sendmail
D.automountd
E.Solaris Secure Shell
Correct:A E

SUN   310-301   310-301   310-301認証試験

NO.11 Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A.It is installed in /usr/bin.
B.It is owned by a normal user.
C.It has the same name as a common program.
D.It contains additional functionality which the user does not expect.
Correct:A

SUN   310-301   310-301   310-301認証試験

NO.12 The system administrator finds a Trojaned login command using md5 and the Solaris
Fingerprint Database. What is true about the system administrator's incident response tasks?
A.The server must be rebuilt.
B.BSM will identify the attacker.
C.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D.All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and
replaced with trusted versions.
Correct:A

SUN   310-301   310-301   310-301認証試験

NO.13 What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A.ssh-add
B.ssh-agent
C.ssh-keyadd
D.ssh-keyload
E.ssh-load-identity
Correct:A

SUN   310-301   310-301   310-301認証試験

NO.14 Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A.ssh-add
B.ssh-agent
C.ssh-keygen
D.ssh-keyadd
Correct:C

SUN   310-301   310-301   310-301認証試験

NO.15 Click the Exhibit button. Which connection demonstrates that telnet has been denied using TCP
Wrappers?
A.Connection 1
B.Connection 2
C.Connection 3
D.Connection 4
Correct:A

SUN   310-301   310-301   310-301認証試験

NO.16 Which setting in the /etc/system file limits the maximum number of user processes to 100 to
prevent a user from executing a fork bomb on a system?
A.set maxuprc = 100
B.set maxusers = 100
C.set user_procs = 100
D.set max_nprocs = 100
Correct:A

SUN   310-301   310-301   310-301認証試験

NO.17 Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose
two.)
A.PATH=/usr/bin:/bin
B.PATH=/usr/bin:/sbin:/usr/sbin
C.PATH=/usr/bin:/sbin:/usr/sbin:
D.PATH=.:/usr/bin:/sbin:/usr/sbin
Correct:C D

SUN   310-301   310-301   310-301認証試験

NO.18 How do you distinguish between denial of service attacks and programming errors?
A.You cannot make this distinction.
B.You examine the audit events for the process.
C.You verify that the process user ID is that of a valid user.
D.You check the binary against the Solaris Fingerprint Database.
Correct:A

SUN   310-301   310-301   310-301認証試験

NO.19 What cryptographic assurance is provided by public key cryptography that is NOT provided by
secret key cryptography?
A.integrity
B.confidentiality
C.authentication
D.non-repudiation
Correct:D

SUN   310-301   310-301   310-301認証試験

NO.20 Which statement about denial of service attack is FALSE?
A.Denial of service is always preventable.
B.Multiple machines may be used as the source of the attack.
C.Service is denied on the victim host when a key resource is consumed.
D.A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service
from using that service.
Correct:A

SUN   310-301   310-301   310-301認証試験

JapanCertは最新のHP0-J61問題集と高品質の000-657問題と回答を提供します。JapanCertの70-561 VCEテストエンジンとHP0-J66試験ガイドはあなたが一回で試験に合格するのを助けることができます。高品質のHP2-B100 PDFトレーニング教材は、あなたがより迅速かつ簡単に試験に合格することを100%保証します。試験に合格して認証資格を取るのはそのような簡単なことです。

記事のリンク:http://www.japancert.com/310-301.html

没有评论:

发表评论