|
Question 1. What is the result, if any, of executing the following code? DCL A BIT(1) INIT('0'B); DCL B BIT(1) INIT('0'B); DCL C BIT(1) lNlT('1'B); A = B ! C; A. The value of A is '0'B B. The value of A is'1'B. C. The value of A is unpredictable. D. There is no result, because the syntax is wrong. Answer: B Question 2. What does BX.WOK.LOAD refer to in the following job control statement? I/ACCOUNT DD DSN=BX.WOK.LOAD,DISP=SHR A. It is the connection between program and dataset. B. It is the physical dataset name. C. It is the logical dataset name. D. It is the name which must be referred to in the program. Answer: B Question 3. What will be printed when the following subroutine is called for the third time? A: PROC; DCLX PlC '9' INIT(O); X = X+ 1; PUT SKIP LIST ('THE VALUE OF X IS :'!!X); X = X+ 1; END A; A. THE VALUE OF X IS : 1 B. THE VALUE OF X IS : 2 C. THE VALUE OF X IS : 3 D. THE VALUE OF X IS : 5 Answer: A Question 4. Given the following code, with what attribute should the variable EOF be declared? DO WHILE(^EOF); A. FIXED BIN (7) B. BIT (1) C. CHAR (1) D. FIXED DEC (3) Answer: B Question 5. Which is the most appropriate code to turn all of the bits in A ON? DCL A BIT(8); A. A = 255; B. A = '11111111'B; C. A = 11111111B; D. A = -1; Answer: B Question 6. What changes should be made, if any, to the following code? DCL A CHAR(100) BASED(P); DCL P PTR; READ FILE(DDIN) INTO(A); A. READ FILE(DDIN) SET(A); B. READ FILE(DDIN) INTO(P); C. READ FILE(DDIN) SET(P); D. No changes necessary because the code is correct. Answer: C Question 7.. What is the value of B after executing the following code? DCL A CHAR(10) VAR; DCL B BIN FIXED(31) INIT(0); DCL C CHAR(5) INIT('ABCD'); A = C; B = LENGTH(A); A. 10 B. 7 C. 5 D. 4 Answer: C Question 8. Which of the following is a BIN FIXED constant? A. '1000' B. 1E+03 C. 1000 D. 1000B Answer: D Question 9. Which of the following is NOT a valid method to activate a BEGIN block? A. A condition is signaled and the BEGIN block is a component of the corresponding ON unit. B. Sequential program flow approaches the BEGIN block. C. The BEGIN block is labeled and a GOTO addresses this label. D. The BEGIN block is labeled and a CALL addresses this label. Answer: D Question 10. Which is the most appropriate data type declaration for the variable A in the following expression, if A is used as a counter? A = A + 1; A. CHAR B. BIN FIXED C. FLOAT D. PlC Answer: B
|
Question 1. Why could OpenVMS Mail be considered a security risk? A. OpenVMS Mail allows unprivileged unauthenticated (but potentially traceable) remote users to test for valid usernames. B. OpenVMS Mail allows unprivileged unauthenticated remote users to see who is actively logged on. C. DCL command procedures embedded in a mail message will be automatically executed during user login unless the system manager defines the system logical name MAIL$DCL_DISABLE to TRUE. D. Buffer overflows caused by out of specification message attachments may allow arbitrary code to be executed without prompting the recipient. Answer: A Question 2. Which two object classes can have audit events applied to them? Select two. A. logical name tables B. logical names C. global sections D. event flags E. locks Answer: A, C Question 3. On a system with user file activity across several volumes, which command or utility can a system manager use to determine what files a process currently has open across all disk volumes? A. SHOW DEVICE/FILES/NOSYSTEM * B. ANALYZE /PROCESS C. MONITOR FILE_SYSTEM_CACHE/ALL D. ANALYZE /SYSTEM Answer: D Question 4. What two items should be included in an organization's Configuration Management records? Select two. A. software assets B. staff contact details C. details of support contracts D. physical assets E. organizational chart Answer: A, D Question 5. Which two are the correct descriptions for L and P when discussing a device protection mask (RWLP)? Select two. A. P = protected (allows access to protected devices) B. L = logical (allows access to logical blocks) C. P =passall (allows unlimited access to specified devices) D. P = physical (allows access to physical blocks) E. L = local (allows access from the local system only) F. L = limited (allows limited access to specified devices) Answer: B, D Question 6. DRAG DROP Click the Task button. You need to break into a system when none of the accounts or passwords are known. Using drag and drop, place the steps in the correct sequence to accomplish this. Answer: Question 7. By default, what happens to system activity if the audit server's log destination runs out of disk space? A. all batch jobs are suspended B. normal operation continues, oldest audits are discarded C. system crashes to protect integrity of auditing records D. audit-generating user processes are suspended Answer: D Question 8. The DCL command DIR 0:: fails with the error message %SYSTEM-F-LINKEXIT, network partner exited. Why could this happen? A. no proxy B. attempts to create a NETSERVER.LOG with a version number over 32767 C. proxy into non-existent target account D. protection violation on login command procedures Answer: D Question 9. A backup system disk copy is missing. What are two of the vulnerabilities that are introduced? Select two. A. passwords can be directly extracted from VMS$PASSWORD_HISTORY.DATA B. licenses can be extracted from LMF$LURT.DAT C. protected system files and data can be read D. usernames and their associated privileges can be listed E. passwords can be directly extracted from SYSUAF.DAT Answer: C, D Question 10. What is the purpose of "high water marking"? A. prevent an application from writing file data beyond the disk quota limit B. limit the use of XFC (eXtended File Cache) buffers C. prevent reading file data beyond the point in a file which has been written D. prevent a process from exhausting its FILLM quota Answer: C Question 11. Which two mechanisms allow authentication of network access to a system without explicit login? Select two. A. proxy account B. Advanced Server C. LDAP D. active directory E. SSH Answer: A, E
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.