Sun Certified Security Administratort
Questions, Answers, Braindumps (310-301)
passing paper i can truly say that its no more easy
and some question are really tricy. I am really thankful
to www.exams.ws for good exhibits.
Part of a fire protection plan for a computer room
A. Procedures for an emergency shutdown of equipment.
B. A sprinkler system that exceeds local code requirements.
C. The exclusive use of non-flammable materials within
D. Fireproof doors that can be easily opened if an
alarm is sounded.
What network mapping tool uses ICMP (Internet Control
A. Port scanner
B. Map scanner
C. Ping scanner
D. Share scanner
Which of the following would be most effective in
preventing network traffic sniffing?
A. Deploy an IDS (Intrusion Detection System).
B. Disable promiscuous mode.
C. Use hubs instead of routers.
D. Use switches instead of hubs.
A user wants to send an e-mail and ensure that the
message is not tampered with while in transit. Which
feature of modern cryptographic systems will facilitate
Which of the following type of attack CANNOT be deterred
solely through technical means?
B. Man in the middle
C. DoS (Denial of Service)
D. Social engineering
An organization is implementing Kerberos as its primary
authentication protocol. Which of the following must
be deployed for Kerberos to function?
A. Dynamic IP (Internet Protocol) routing protocols
for routers and servers.
B. Separate network segments for the realms.
C. Token authentication devices.
D. Time synchronization services for clients and servers.
Which of the following is likely to be found after
enabling anonymous FTP (File Transfer Protocol) read/write
A. An upload and download directory for each user.
B. Detailed logging information for each user.
C. Storage and distribution of unlicensed software.
D. Fewer server connections and less network bandwidth
NetBusand Back Orifice are each considered an example
B. Illicit server
C. Spoofing tool
D. Allowable server
Which of the following access control models introduces
user security clearance and data classification?
A. RBAC (Role Based Access Control)
B. NDAC (Non-Discretionary Access Control)
C. MAC (Mandatory Access Control).
D. DAC (Discretionary Access Control)
Why are unique user IDs critical in the review of
A. They CANNOT be easily altered.
B. They establish individual accountability.
C. They show which files were changed.
D. They trigger corrective controls.
Which of the following would NOT be considered a method
for managing the administration of accessibility?
A. DAC (Discretionary Access Control) list
B. SAC (Subjective Access Control) list
C. MAC (Mandatory Access Control) list
D. RBAC (Role Based Access Control) list