what files a process currently has open across all disk volumes?
On a system with user file activity across several volumes, which command or utility can a system
manager use to determine what files a process currently has open across all disk volumes?
which techniques are used to control access?
When setting up the disk and file structures for user data, which techniques are used to control
access? Select TWO.
What two areas need to be considered prior to implementing such a solution?
Encrypted file transfers between systems provide better data integrity and confidentiality than “in
the clear” transfers. What two areas need to be considered prior to implementing such a solution?
Select two.
What are two of the vulnerabilities that are introduced?
A backup system disk copy is missing. What are two of the vulnerabilities that are introduced?
Select two.
Using drag and drop, place the steps in the correct sequence to accomplish this.
Which feature of OpenVMS allows verification of the integrity and authenticity of product installation kits?
Which feature of OpenVMS allows verification of the integrity and authenticity of product
installation kits?
Using drag and drop, select and place the remaining modes of execution in order of increasing access
Which user is logged in via SSH?
How can you configure a SAN to prevent access of a system’s storage devices from another system?
How can you configure a SAN to prevent access of a system’s storage devices from another
system? Select two.
What are two ways an OpenVMS system manager can safely allow operational staff (with less privileges) to perfo
What are two ways an OpenVMS system manager can safely allow operational staff (with less
privileges) to perform privileged or security-sensitive operations (such as backup, disk cleanup,
etc)? Select two.