310-301 Exam
Sun Certified Security Administrator
- Exam Number/Code : 310-301
- Exam Name : Sun Certified Security Administrator
- Questions and Answers : 240 Q&As
- Update Time: 2013-04-05
-
Price:
$ 119.00$ 69.00 -
310-301 Hard Copy (PDF)
-
310-301 Test Engine
Free 310-301 Demo Download
Test4pass offers free demo for SCSA10 310-301 exam (Sun Certified Security Administrator). You can check out the interface, question quality and usability of our practice exams before you decide to buy it. We are the only one site can offer demo for almost all products.
Exam Description
It is well known that 310-301 exam test is the hot exam of SUN certification. Test4pass offer you all the Q&A of the 310-301 real test . It is the examination of the perfect combination and it will help you pass 310-301 exam at the first time!
Why choose Test4pass 310-301 braindumps
Quality and Value for the 310-301 Exam
100% Guarantee to Pass Your 310-301 Exam
Downloadable, Interactive 310-301 Testing engines
Verified Answers Researched by Industry Experts
Drag and Drop questions as experienced in the Actual Exams
Practice Test Questions accompanied by exhibits
Our Practice Test Questions are backed by our 100% MONEY BACK GUARANTEE.
Test4pass 310-301 Exam Features
Quality and Value for the 310-301 Exam
Test4pass Practice Exams for SUN 310-301 are written to the highest standards of technical accuracy, using only certified subject matter experts and published authors for development.
100% Guarantee to Pass Your 310-301 Exam
If you prepare for the exam using our Test4pass testing engine, we guarantee your success in the first attempt. If you do not pass the SCSA10 310-301 exam (ProCurve Secure WAN) on your first attempt we will give you a FULL REFUND of your purchasing fee AND send you another same value product for free.
SUN 310-301 Downloadable, Printable Exams (in PDF format)
Our Exam 310-301 Preparation Material provides you everything you will need to take your 310-301 Exam. The 310-301 Exam details are researched and produced by Professional Certification Experts who are constantly using industry experience to produce precise, and logical. You may get questions from different web sites or books, but logic is the key. Our Product will help you not only pass in the first try, but also save your valuable time.
310-301 Downloadable, Interactive Testing engines
We are all well aware that a major problem in the IT industry is that there is a lack of quality study materials. Our Exam Preparation Material provides you everything you will need to take a certification examination. Like actual certification exams, our Practice Tests are in multiple-choice (MCQs) Our SUN 310-301 Exam will provide you with free 310-301 dumps questions with verified answers that reflect the actual exam. These questions and answers provide you with the experience of taking the actual test. High quality and Value for the 310-301 Exam:100% Guarantee to Pass Your SCSA10 exam and get your SCSA10 Certification.
Hot KeyWords On 310-301 test
We collect some hot keywords about this exam:
Test4pass , Pass 4 Sure , Test in Side ,Pass Guide ,Test King 310-301 exam | 310-301 pdf exam | 310-301 braindumps | 310-301 study guides | 310-301 trainning materials | 310-301 simulations | 310-301 testing engine | 310-301 vce | 310-301 torrent | 310-301 dumps | free download 310-301 | 310-301 practice exam | 310-301 preparation files | 310-301 questions | 310-301 answers.
How to pass your 310-301 exam
You can search on Search Engine and Find Best IT Certification site: Test4pass.com - Find the Method to succeed 310-301 test,The safer.easier way to get SCSA10 Certification .
��
Exam : SUN 310-301
Title : Sun Certified Security Administrator Solaris 9
1. Click the Exhibit button.
Which connection demonstrates that telnet has been denied using TCP Wrappers?
A. Connection 1
B. Connection 2
C. Connection 3
D. Connection 4
Answer: A
2. Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
A. inetd
B. rpcbind
C. sendmail
D. automountd
E. Solaris Secure Shell
Answer: AE
3. Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)
A. AES
B. RSA
C. DSA
D. DES
E. 3DES
Answer: BC
4. What command loads a DSA identity into a Solaris Secure Shell authentication agent?
A. ssh-add
B. ssh-agent
C. ssh-keyadd
D. ssh-keyload
E. ssh-load-identity
Answer: A
5. Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A. ssh-add
B. ssh-agent
C. ssh-keygen
D. ssh-keyadd
Answer: C
6. Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose two.)
A. PATH=/usr/bin:/bin
B. PATH=/usr/bin:/sbin:/usr/sbin
C. PATH=/usr/bin:/sbin:/usr/sbin:
D. PATH=.:/usr/bin:/sbin:/usr/sbin
Answer: CD
7. Which threat can be mitigated by setting the Open Boot PROM security mode to full?
A. system panics
B. booting into single user mode
C. remotely accessing the console
D. logging in as root at the console
Answer: B
8. Which is uncharacteristic of a Trojan horse program used to escalate privileges?
A. It is installed in /usr/bin.
B. It is owned by a normal user.
C. It has the same name as a common program.
D. It contains additional functionality which the user does not expect.
Answer: A
9. Which cryptographic assurances are provided by SSL?
A. confidentiality, integrity, availability
B. authorization, confidentiality, message integrity
C. confidentiality, client authentication, server authentication
D. authentication, confidentiality, access control, non-repudiation
Answer: C
10. /var/adm/messages contains this output:
Jan 28 21:23:18 mailhost in.telnetd[20911]:
[ID 808958 daemon.warning] refused connect from
ns.foo.com (access denied)
Why was this line generated?
A. A user connecting from ns.foo.com failed to authenticate.
B. The user daemon is not allowed to log in from ns.foo.com.
C. A portscan was run against mailhost from ns.foo.com.
D. The TCP Wrapper configuration does not allow telnet connections from ns.foo.com.
Answer: D
11. Which setting in the /etc/system file limits the maximum number of user processes to 100 to prevent a user from executing a fork bomb on a system?
A. set maxuprc = 100
B. set maxusers = 100
C. set user_procs = 100
D. set max_nprocs = 100
Answer: A
12. Which is a public key encryption algorithm?
A. AH
B. AES
C. RSA
D. PGP
E. IDEA
Answer: C
13. What cryptographic assurance is provided by public key cryptography that is NOT provided by secret key cryptography?
A. integrity
B. confidentiality
C. authentication
D. non-repudiation
Answer: D
14. The system administrator finds a Trojaned login command using md5 and the Solaris Fingerprint Database. What is true about the system administrator's incident response tasks?
A. The server must be rebuilt.
B. BSM will identify the attacker.
C. All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D. All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and replaced with trusted versions.
Answer: A