Which two mechanisms allow authentication of network access to a system without explicit login?
Which two mechanisms allow authentication of network access to a system without explicit login?
Select two.
What are two backup and restore implications with respect to ACL-protected files?
What are two backup and restore implications with respect to ACL-protected files? Select two.
What should be the response to this situation?
A routine visit to investigate a report of poor network performance at a remote site indicates the
network router has been replaced by a combined router/wireless access point. No one will admit to
installing the access point, and it was left operating in default configuration. What should be the
response to this situation? Select three.
What are three possible destinations for security audit events?
What are three possible destinations for security audit events? Select three.
What are two elements of CLUSTER_AUTHORIZE.DAT?
What are two elements of CLUSTER_AUTHORIZE.DAT? Select two.
which statement is true regarding attempts to retrieve a given user’s password?
Given a separate copy of an OpenVMS UAF, which statement is true regarding attempts to
retrieve a given user’s password? Select two.
Which three are valid components of an object’s security profile?
Which three are valid components of an object’s security profile? Select three.
How can you ensure a single sign-on authentication mechanism with a common password across all clusters?
An organization has several OpenVMS clusters. How can you ensure a single sign-on
authentication mechanism with a common password across all clusters?
Which OpenVMS command is used to show active TCP connections?
Which OpenVMS command is used to show active TCP connections?
What is the purpose of "erase on delete"?
What is the purpose of “erase on delete”?