Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "HP0-081" Exam

OpenVMS Security Administration

 Question 1.
Why could OpenVMS Mail be considered a security risk?

A. OpenVMS Mail allows unprivileged unauthenticated (but potentially traceable) remote users to 
    test for valid usernames.
B. OpenVMS Mail allows unprivileged unauthenticated remote users to see who is actively logged 
    on.
C. DCL command procedures embedded in a mail message will be automatically executed during 
    user login unless the system manager defines the system logical name MAIL$DCL_DISABLE 
    to TRUE.
D. Buffer overflows caused by out of specification message attachments may allow arbitrary code 
    to be executed without prompting the recipient.

Answer: A

Question 2.
Which two object classes can have audit events applied to them? Select two.

A. logical name tables
B. logical names
C. global sections
D. event flags
E. locks

Answer: A, C

Question 3.
On a system with user file activity across several volumes, which command or utility can a system manager use to determine what files a process currently has open across all disk volumes?

A. SHOW DEVICE/FILES/NOSYSTEM *
B. ANALYZE /PROCESS
C. MONITOR FILE_SYSTEM_CACHE/ALL
D. ANALYZE /SYSTEM

Answer: D

Question 4.
What two items should be included in an organization's Configuration Management records? Select two.

A. software assets
B. staff contact details
C. details of support contracts
D. physical assets
E. organizational chart

Answer: A, D

Question 5.
Which two are the correct descriptions for L and P when discussing a device protection mask (RWLP)? Select two.

A. P = protected (allows access to protected devices)
B. L = logical (allows access to logical blocks)
C. P =passall (allows unlimited access to specified devices)
D. P = physical (allows access to physical blocks)
E. L = local (allows access from the local system only)
F. L = limited (allows limited access to specified devices)

Answer: B, D

Question 6.
DRAG DROP
Click the Task button.
You need to break into a system when none of the accounts or passwords are known. Using drag and drop, place the steps in the correct sequence to accomplish this.
 

Answer:
 

Question 7.
By default, what happens to system activity if the audit server's log destination runs out of disk space?

A. all batch jobs are suspended
B. normal operation continues, oldest audits are discarded
C. system crashes to protect integrity of auditing records
D. audit-generating user processes are suspended

Answer: D

Question 8.
The DCL command DIR 0:: fails with the error message %SYSTEM-F-LINKEXIT, network partner exited. Why could this happen?

A. no proxy
B. attempts to create a NETSERVER.LOG with a version number over 32767
C. proxy into non-existent target account
D. protection violation on login command procedures

Answer: D

Question 9.
A backup system disk copy is missing. What are two of the vulnerabilities that are introduced? Select two.

A. passwords can be directly extracted from VMS$PASSWORD_HISTORY.DATA
B. licenses can be extracted from LMF$LURT.DAT
C. protected system files and data can be read
D. usernames and their associated privileges can be listed
E. passwords can be directly extracted from SYSUAF.DAT

Answer: C, D

Question 10.
What is the purpose of "high water marking"?

A. prevent an application from writing file data beyond the disk quota limit
B. limit the use of XFC (eXtended File Cache) buffers
C. prevent reading file data beyond the point in a file which has been written
D. prevent a process from exhausting its FILLM quota

Answer: C

Question 11.
Which two mechanisms allow authentication of network access to a system without explicit login? Select two.

A. proxy account
B. Advanced Server
C. LDAP
D. active directory
E. SSH

Answer: A, E


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.