|
Question 1. When triggered by an event within the cage, what describes the actions taken by Symantec Decoy Server? A. Event trigger B. Script response C. Response policy D. Frequency-based policy Answer: C Question 2. What features does Symantec Decoy Server use to automatically discard insignificant events? A. Threat filters B. Policy filters C. Report filters D. Advanced filters Answer: B Question 3. How many physical interfaces are required on a Symantec Decoy Server Host configured with four cages? A. 1 B. 2 C. 4 D. 5 Answer: D Question 4. Which two management functions does the Symantec Decoy Server provide? A. Live Update B. Data rollover C. Data structuring D. Automated backup/restore Answer: B, D Question 5. Which type of intrusion detection does Symantec Decoy server provide? A. Only host-based B. Behavioral-based C. Only network-based D. Host-based and network-based Answer: D Question 6. Symantec Decoy Server offers a unique advantage in detecting which type of intrusion? A. a slow scan B. a remote buffer overflow C. a distributed denial of service D. an attack with known signatures Answer: A Question 7. Which two functions does the Symantec Decoy Server console provide? (Choose two) A. User tracking B. Reverse lookup C. Single point upgrades D. Data maintenance and compression Answer: B, D Question 8. Which authentication service certifies that attack data are not altered on Symantec Decoy Server? A. RSA B. Entrust C. iButton D. Verisign Answer: C Question 9. Your organization has decided to create a new cage on a Symantec Decoy Server. In order to make the environment as convincing as possible, the content should be randomly generated. How can you accomplish this? A. Use Content Generation Module B. Use random generation console C. Import content from existing servers D. Automatically done by Symantec Decoy Server Answer: A Question 10. Which three organizations actively monitor the release of patches and upgrades from vendors? (Choose three) A. CERT B. Microsoft C. Symantec D. Security focus E. Sun Microsystems Answer: A, C, D Question 11. Which type of attacks are anomaly-based intrusion detection systems primarily designed to detect? A. Novel B. Known C. Host-based D. Network-based Answer: A Question 12. Which two management functions does the Symantec Decoy Server provide? (Choose two.) A. Roster file backup B. Resource pool tracking C. Report generation scheduling D. Centralized software updates Answer: C, D Question 13. In which format is all Symantec Decoy Server intrusion analysis data compiled? A. XML log format B. HTML-formatted templates C. Time-stamped logs that are stored in uneditable files D. Time-stamped logs that are stored in a relational database Answer: C Question 14. What does the Symantec Decoy Server virtual environment appear as to an attacker? A. ALX operating system with associated applications and services B. Linux operating system with associated applications and services C. Solaris operating system with associated applications and services D. Windows operating system with associated applications and services Answer: C Question 15. Which two are Symantec Decoy Server response types? (Choose two.) A. SNMP B. Track back C. Traffic record D. Shutdown cage Answer: A, D
|
Question 1. Exhibit: What is this and how can it be executed? A. It's a JCL procedure and cannot be executed. B. It's a job and may be submitted with a SUBMIT command. C. It's a JCL procedure and can be executed with a submit command. D. It's a JCL procedure and must be invoked in a job with an EXEC statement. Answer: D Question 2. In the ISPF Edit panel, there are fields named PROJECT, GROUP, TYPE, and MEMBER. What information do these fields specify? A. DSNAME B. DDNAME C. PARM field D. DD Statement Answer: A Question 3. Which of the following describes relative access speed for z9 major storage types? A. Tape is faster than DASD B. DASD is faster than cache C. Real memory is faster than DASD D. Optical storage is faster than cache Answer: C Question 4. Which of the following are the types of EDIT commands? A. Menu and Line B. Line and Data C. Primary and Line D. Primary and Secondary Answer: C Question 5. Which of the following z/OS data set organization is most like a UNIX directory? A. VSAM RRDS B. Sequential data set C. Partitioned data set D. VSAM Indexed data set Answer: C Question 6. If a userid is ZTEST1, then what is entered in the Data Set List Utility (generally option 3.4) for "Dsname Level" to list all data sets with the high level qualifier of the userid? A. ZTEST1 B. "ZTEST1" C. *.ZTEST1* D. 'ZTEST1*' Answer: A Question 7. PC keyboards do not have a "PA1" key, 3270 emulators map some keys to "PA1". What is the "PA1" key used for in TSO and ISPF? A. Terminate the program currently running. B. Terminate ISPF to return to the TSO READY prompt. C. Pause a program so that data will not continue to scroll. D. Clear the screen to allow the next screen of data to display. Answer: A Question 8. The syntax: //INPUT DD* is used for what purpose? A. To specify that this DDNAME refers to a null dataset B. To specify that this DDNAME refers to the same dataset as the prior DD statement C. To specify that the data is contained in the JCL stream immediately after this DD statement D. To specify that the DDNAME refers to the same dataset as the DD statement with DDNAME of INPUT in the prior job step Answer: C Question 9. What is the relationship of the Layered Network Models of TCP/IP, OSI, and SNA? A. SNA is an internal construction in z/OS and does not allow for end points. B. They are the same except that the OSI model inverts the layers top to bottom. C. They have the same layers with the exact same functions in each layer, but the names are different. D. The layers are conceptually similar but differ in name and details of what functions are in which layers. Answer: D Question 10. A mainframe customer wants to add a web site for customer orders. They plan to tightly couple the web site to their existing back office z/OS applications. Which of the following describes an effective implementation? A. Bring in another System z machine B. Implement a firewall on the mainframe and use WebSphere to enable the web site on a Linux server. C. Implement a firewall on a new, small Unix server and use WebSphere to enable the web site on the mainframe. D. Implement a firewall on a new Windows XP server and use WebSphere to enable the web site on a new Windows XP server. Answer: C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.