Which three mechanisms does OpenVMS provide for detecting and reporting security-related events?
Which three mechanisms does OpenVMS provide for detecting and reporting security-related
events? Select three.
What is the relevant OpenVMS security mechanism?
Policy requires that a particularly sensitive application is available only when two specific users are
present. What is the relevant OpenVMS security mechanism?
Why does an OpenVMS system with both internal and external users need to be protected by a hardware firewall?
Why does an OpenVMS system with both internal and external users need to be protected by a
hardware firewall?
Using drag and drop, place the steps in sequence to correct the situation so that BOND retains his original UI
DRAG DROP
Click the Task button.
The system manager needs to create a user account for M. He mistakenly starts by copying
BOND’s UAF entry (UIC [700, 7]) without specifying the new UIC ([700,1]).
Using drag and drop, place the steps in sequence to correct the situation so that BOND retains his
original UIC and M is identified as [701,1].
Which three of the following are elements of the "trusted computing base"?
The “trusted computing base” is a term for the elements of the OpenVMS operating system. Which
three of the following are elements of the “trusted computing base”? Select three.
What are the security implications of a user having PGFLQUOTA set too high?
What are the security implications of a user having PGFLQUOTA set too high?
What are two ways an OpenVMS system manager can safely allow operational staff (with less privileges) to perfo
What are two ways an OpenVMS system manager can safely allow operational staff (with less
privileges) to perform privileged or security-sensitive operations (such as backup, disk cleanup,
etc)? Select two.