310-301 SCSA10 Braindump
ExamSoon 310-301 Exams
SUN Sun Certified Security Administrator
O rder : 310-301 Exam
Practice Exam: 310-301
Exam Number/Code: 310-301
Exam Name: Sun Certified Security Administrator
Questions and Answers: 240 Q&As
Free 310-301 Braindumps
Exam : SUN 310-301
Title : Sun Certified Security Administrator Solaris 9
1. How do you distinguish between denial of service attacks and programming errors?
A. You cannot make this distinction.
B. You examine the audit events for the process.
C. You verify that the process user ID is that of a valid user.
D. You check the binary against the Solaris Fingerprint Database.
Answer: A
2. The system administrator finds a Trojaned login command using md5 and the Solaris Fingerprint Database. What
is true about the system administrator's incident response tasks?
A. The server must be rebuilt.
B. BSM will identify the attacker.
C. All other replaced system files can be identified using md5 and the Solaris Fingerprint Database.
D. All other replaced system files can be identified using md5 and the Solaris Fingerprint Database and replaced with
trusted versions.
Answer: A
3. Which command generates client key pairs and adds them to the $HOME/.ssh directory?
A. ssh-add
B. ssh-agent
C. ssh-keygen
D. ssh-keyadd
Answer: C
4. Which statement about denial of service attack is FALSE?
A. Denial of service is always preventable.
B. Multiple machines may be used as the source of the attack.
C. Service is denied on the victim host when a key resource is consumed.
D. A denial of service attack is an explicit attempt by an attacker to prevent legitimate users of a service from using
that service.
Answer: A
5. Which setting in the /etc/system file limits the maximum number of user processes to 100 to prevent a user from
executing a fork bomb on a system?
A. set maxuprc = 100
B. set maxusers = 100
C. set user_procs = 100
D. set max_nprocs = 100
Answer: A
6. Which evasion technique can NOT be detected by system integrity checks?
A. installing a rootkit
B. add