REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 
Robert
 
 

 

Braindumps of HP0-276
OpenVMS Security Administration

 

Exam Questions, Answers, Braindumps (HP0-276)
These are Guaranteed Questions for HP0-276 exam. I only used www.exams.ws guide and i was through.


Question: 1
When writing secure command procedures, why should READ/PROMPT be used instead of INQUIRE?
A. because INQUIRE only works with captive accounts
B. because READ/PROMPT does not perform symbol substitution on the user input
C. because READ/PROMPT creates an audit trail record in SECURITY.AUDIT$JOURNAL
D. because INQUIRE echoes user input back to the terminal by default
Answer: B


Question: 2
A system manager wants to ensure that non-privileged users can only access those files for which they already know the file name. How can files in a directory be protected so this is accomplished?
A. it is not possible to do this
B. set directory protection to control, and file access as required
C. set directory protection to no access, and file access as required
D. set directory protection to execute, and file access as required
Answer: D


Question: 3
What is the default protection mask set by the system parameter RMS_FILEPROT value=64000 (decimal)?
A. (S:RWED,O:RWED,G:RE,W:RE)
B. (S:RWE,O:RWE,G:RE,W:RE)
C. (S:RWE,O:RWE,G:RE,W:RE)
D. (S:RWED,O:RWED,G:RE,W:)
Answer: D


Question: 4
On a system with user file activity across several volumes, which command or utility can a system manager use to determine what files a process currently has open across all disk volumes?
A. ANALYZE /PROCESS
B. ANALYZE /SYSTEM
C. SHOW DEVICE/FILES/NOSYSTEM *
D. MONITOR FILE_SYSTEM_CACHE/ALL
Answer: B


Question: 5
By default, what happens to system activity if the audit server's log destination runs out of disk space?
A. all batch jobs are suspended
B. system crashes to protect integrity of auditing records
C. normal operation continues, oldest audits are discarded
D. audit-generating user processes are suspended
Answer: D


Question: 6
The system parameter MAXSYSGROUP defines the maximum UIC group value which is recognized as a system UIC. What is the default value?
A. 10 Decimal
B. 10 Binary
C. 10 Hex
D. 10 Octal
Answer: D


Question: 7
A file has a primary directory entry and one or more alias entries (SET FILE/ENTER). Which file system data structure controls access to the file data?
A. primary directory entry
B. least permissive of primary and alias directory entries
C. most permissive of primary and alias directory entries
D. file's own file header
E. alias directory entry
Answer: D

HP0-276

 

 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend