Which two commands are required to implement this policy?
Security policy states that an audit journal entry is required when a file in the directory [AGENTS]
is deleted. Which two commands are required to implement this policy? Select two.
What can be done to prevent IP node spoofing within an OpenVMS environment?
What can be done to prevent IP node spoofing within an OpenVMS environment?
Which command displays active DECnet Phase V application connections?
Which command displays active DECnet Phase V application connections?
What is the common reason for this?
During migration from DECnet Phase IV to Phase V, the nodenames are registered via the local
naming option. The proxy accounts stop working. What is the common reason for this?
What are the security implications of using the same DECnet address?
An unauthorized system has been connected to the network using the same DECnet address as a
system that is out of service due to a network fault. What are the security implications of using the
same DECnet address?
What are three OpenVMS protected object classes?
What are three OpenVMS protected object classes? Select three.
Using drag and drop, indicate the type of access that C, D, M, R, and S signify in the context of queue manage
which files will PHILBY be able to read?
User PHILBY, UIC [SIS,PHILBY], holds rights identifiers LONDON and CAMBRIDGE. Given the
following files security profiles, which files will PHILBY be able to read? Select two.
What are five valid characters in OpenVMS passwords within the default configuration?
What are five valid characters in OpenVMS passwords within the default configuration? Select
five.
What is the default value?
The system parameter MAXSYSGROUP defines the maximum UIC group value which is
recognized as a system UIC. What is the default value?