310-303 Exam
Sun Certified Security Administrator for the Solaris 10 OS
- Exam Number/Code : 310-303
- Exam Name : Sun Certified Security Administrator for the Solaris 10 OS
- Questions and Answers : 295 Q&As
- Update Time: 2013-04-05
-
Price:
$ 119.00$ 69.00 -
310-303 Hard Copy (PDF)
-
310-303 Test Engine
Free 310-303 Demo Download
Test4pass offers free demo for SCSA10 310-303 exam (Sun Certified Security Administrator for the Solaris 10 OS). You can check out the interface, question quality and usability of our practice exams before you decide to buy it. We are the only one site can offer demo for almost all products.
Exam Description
It is well known that 310-303 exam test is the hot exam of SUN certification. Test4pass offer you all the Q&A of the 310-303 real test . It is the examination of the perfect combination and it will help you pass 310-303 exam at the first time!
Why choose Test4pass 310-303 braindumps
Quality and Value for the 310-303 Exam
100% Guarantee to Pass Your 310-303 Exam
Downloadable, Interactive 310-303 Testing engines
Verified Answers Researched by Industry Experts
Drag and Drop questions as experienced in the Actual Exams
Practice Test Questions accompanied by exhibits
Our Practice Test Questions are backed by our 100% MONEY BACK GUARANTEE.
Test4pass 310-303 Exam Features
Quality and Value for the 310-303 Exam
Test4pass Practice Exams for SUN 310-303 are written to the highest standards of technical accuracy, using only certified subject matter experts and published authors for development.
100% Guarantee to Pass Your 310-303 Exam
If you prepare for the exam using our Test4pass testing engine, we guarantee your success in the first attempt. If you do not pass the SCSA10 310-303 exam (ProCurve Secure WAN) on your first attempt we will give you a FULL REFUND of your purchasing fee AND send you another same value product for free.
SUN 310-303 Downloadable, Printable Exams (in PDF format)
Our Exam 310-303 Preparation Material provides you everything you will need to take your 310-303 Exam. The 310-303 Exam details are researched and produced by Professional Certification Experts who are constantly using industry experience to produce precise, and logical. You may get questions from different web sites or books, but logic is the key. Our Product will help you not only pass in the first try, but also save your valuable time.
310-303 Downloadable, Interactive Testing engines
We are all well aware that a major problem in the IT industry is that there is a lack of quality study materials. Our Exam Preparation Material provides you everything you will need to take a certification examination. Like actual certification exams, our Practice Tests are in multiple-choice (MCQs) Our SUN 310-303 Exam will provide you with free 310-303 dumps questions with verified answers that reflect the actual exam. These questions and answers provide you with the experience of taking the actual test. High quality and Value for the 310-303 Exam:100% Guarantee to Pass Your SCSA10 exam and get your SCSA10 Certification.
Hot KeyWords On 310-303 test
We collect some hot keywords about this exam:
Test4pass , Pass 4 Sure , Test in Side ,Pass Guide ,Test King 310-303 exam | 310-303 pdf exam | 310-303 braindumps | 310-303 study guides | 310-303 trainning materials | 310-303 simulations | 310-303 testing engine | 310-303 vce | 310-303 torrent | 310-303 dumps | free download 310-303 | 310-303 practice exam | 310-303 preparation files | 310-303 questions | 310-303 answers.
How to pass your 310-303 exam
You can search on Search Engine and Find Best IT Certification site: Test4pass.com - Find the Method to succeed 310-303 test,The safer.easier way to get SCSA10 Certification .
��
Exam : SUN 310-303
Title : Sun Certified Security Administrator for the Solaris 10 OS
1. Click the Exhibit button.
You maintain a minimized and hardened web server. The exhibit shows the current credentials that the web server runs with. You receive a complaint about the fact that a newly installed web-based application does not function. This application is based on a /bin/ksh cgi-bin script.
What setting prevents this cgi-bin program from working?
A. The system might NOT have /bin/ksh installed.
B. The server is NOT allowed to call the exec system call.
C. The server should run with uid=0 to run cgi-bin scripts.
D. Some of the libraries needed by /bin/ksh are NOT present in the webserver's chroot environment.
Answer: B
2. You are configuring a new system to be used as an intranet web server. After you have installed the minimal amount of packages and patched the system, you added the appropriate web server packages (SUNWapch2r and SUNWapch2u). By default, the web server daemon will be started using UID webservd and the basic privilege set. To comply with the company's policy of least privilege, you need to minimize the privileges that the web server will have. What will you modify to specify the privileges that the web service will run with?
A. the PRIV_DEFAULT setting in /etc/security/policy.conf
B. the defaultpriv setting of webserverd in /etc/user_attr
C. the privileges property of the web service in the SMF repository
D. the privs property of the web service in /etc/security/exec_attr
Answer: C
3. A security administrator is required to validate the integrity of a set of operating system files on a number of Solaris systems. The administrator decides to use the Solaris Fingerprint Database to validate configuration and data files as well as binaries and libraries. What command, available by default in Solaris 10, will help the security administrator collect the necessary information that will be used with the Solaris Fingerprint Database?
A. md5sum
B. digest
C. encrypt
D. elfsign
E. cryptoadm
Answer: B
4. A security administrator creates a directory called prevoy with the following access control policy:
$ getfacl prevoy
# file: prevoy
# owner: secadm
# group: secadm
user::rwx group::r-x #effective:r-x
mask:r-x
other:r-x
default:user::r--
default:user:sysadm:rw-
default:group::r--
default:group:sysadm:rw-
default:mask:rwx
default:other:---
Into this directory, the security administrator creates a file called secrets. The ls command reports the following for the prevoy directory and secrets file:
$ ls -ld . secrets
drwxr-xr-x+ 2 secadm secadm 512 Jun 6 16:38 .
-r--r-----+ 1 secadm secadm 0 Jun 6 16:38 secrets
Which two actions can be successfully taken by the sysadm role? (Choose two.)
A. The sysadm role can read the secrets file.
B. The sysadm role can write to the secrets file.
C. The sysadm role can remove the secrets file.
D. The sysadm role can create new files under the prevoy directory.
E. The sysadm role can change the Access Control Lists of the prevoy directory.
Answer: AB
5. Which two commands are part of Sun Update Connection? (Choose two.)
A. /usr/bin/pkgadm
B. /usr/bin/keytool
C. /usr/sbin/smpatch
D. /usr/sbin/patchadd
E. /usr/bin/updatemanager
Answer: CE
6. One of the operators of the mainframe group was moved to the UNIX group and tasked to activate and configure password history. For every user, the last 10 passwords should be remembered in the history. In what file is the size of the password history configured?
A. /etc/shadow
B. /etc/pam.conf
C. /etc/default/passwd
D. /etc/security/policy.conf
Answer: C
7. Solaris Auditing supports the selective logging of which two kinds of events? (Choose two.)
A. file access by selected users
B. access to selected files by all users
C. selected users making outbound network connections
D. password changes which do not meet the system password policy
Answer: AC
8. Which two tasks does the Key Distribution Center (KDC) perform? (Choose two.)
A. issues service tickets
B. authenticates services
C. issues ticket-granting-tickets
D. validates passwords sent in clear text
E. provides private sessions to services
Answer: AC
9. The company security policy now requires very detailed auditing of all actions. This includes capturing all executed commands together with their arguments and the environment variables.
After activating auditing on all Solaris 10 systems, the security auditor complains about having to check the audit trail on each individual host. He asks for a central place to capture all audit trails.
Using standard Solaris 10 security features, which is a solution to this problem?
A. Configure auditd to send email with the events.
B. Configure auditd to send the output using syslog to a central loghost.
C. Configure auditd to store the audit trail using NFS on a central server.
D. Configure auditd to store the audit trail using LDAP in a central directory.
Answer: C
10. A security administrator has a requirement to deploy the Solaris Security Toolkit onto all Solaris servers in the department. In this environment, there are a variety of platforms and operating system versions deployed. Onto which two platforms and operating system combinations can the Solaris Security Toolkit be deployed in a supported configuration? (Choose two.)
A. x86, Solaris 2.4
B. x64, Solaris 9
C. x86, Solaris 10
D. SPARC, Solaris 2.6
E. SPARC, Solaris 8
Answer: CE
11. Within the context of file integrity, rules can be implemented to change the scope of the Basic Audit and Report Tool (BART) manifest.
Given the rule file:
/home/bert/docs *.og[dt]
CHECK all
IGNORE mtime
Which two statements are valid? (Choose two.)
A. All files on the system will be checked.
B. The last modification time of all checked files will not be checked.
C. Key words such as CHECK and IGNORE can NOT be used in a rule file.
D. Only files with extension .ogt and .ogd in the directory /home/bert/docs will be checked.
E. All files on the system will be checked, except for files with extensions .ogt and .ogd in the directory /home/bert/docs.
Answer: BD
12. The /etc/default/passwd file contains a number of configuration parameters that can be used to constrain the character composition of user passwords. What is one of the dangers of having password composition too tightly constrained?
A. Password complexity rules apply only to the English alphabet.
B. The entropy of the resulting password strings will be very high.
C. Duplication of encrypted user password strings is much more likely.
D. Limited password value possibilities can simplify brute force attacks.
E. Passwords are harder to compute when using many character classes.
Answer: D
13. Given:
jupiter:$md5,rounds=2006$2amXesSj5$$kCF48vfPsHDjlKNXeEw7V.:12210::::::
What is the characteristic of this /etc/shadow entry?
A. User jupiter uses the md5 hash, with salt 2006$2amXesSj5$, and with the encrypted password $kCF48vfPsHDjlKNXeEw7V.
B. User jupiter uses the 2a hash, with 2006 iterations of the hash, with salt 2amXesSj5, and with the encrypted password kCF48vfPsHDjlKNXeEw7V.
C. User jupiter uses the md5 hash, with 2006 iterations of the hash, with salt 2amXesSj5, and with the encrypted password kCF48vfPsHDjlKNXeEw7V.
D. User jupiter uses the md5 hash, with 2006 iterations of the hash, with no salt, and with the encrypted password $rQmXesSj5$$kCF48vfPsHDjlKNXeEw7V.
Answer: C
14. After a recent audit, you have been requested to minimize an existing Solaris system which runs a third party database application. Which two should you do before starting to minimize the system? (Choose two.)
A. Back up the system.
B. Remove any unneeded patches.
C. Install the SUNWrnet metacluster.
D. Remove any unneeded packages.
E. Confirm with the vendor of the database software that they support minimization.
Answer: AE