in AUTHORIZE)?
Which two options are valid access modes (e.g. in AUTHORIZE)? Select two.
Which two security threats are generally unsuccessful on an OpenVMS system?
Which two security threats are generally unsuccessful on an OpenVMS system? Select two.
What are two reasons proxy accounts are preferred to explicit access control strings for network access betwee
What are two reasons proxy accounts are preferred to explicit access control strings for network
access between systems? Select two.
why should READ/PROMPT be used instead of INQUIRE?
When writing secure command procedures, why should READ/PROMPT be used instead of
INQUIRE?
What can be done to prevent IP node spoofing within an OpenVMS environment?
What can be done to prevent IP node spoofing within an OpenVMS environment?
Using drag and drop, select and place the remaining modes of execution in order of increasing access
What two benefits can account quotas provide on an OpenVMS system?
What two benefits can account quotas provide on an OpenVMS system? Select two.
Which two objects are accessible to processes with specific authorized privileges enabled?
Which two objects are accessible to processes with specific authorized privileges enabled? Select
two.
what two files must be cluster-common to maintain a clusterwide security environment?
In an OpenVMS cluster, what two files must be cluster-common to maintain a clusterwide security
environment? Select two.
What is the primary purpose of the OpenVMS audit facility?
What is the primary purpose of the OpenVMS audit facility?