Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com
QUESTION 1
Why could OpenVMS Mail be considered a security risk?
A. OpenVMS Mail allows unprivileged unauthenticated (but potentially traceable) remote users to
test for valid usernames.
B. OpenVMS Mail allows unprivileged unauthenticated remote users to see who is actively logged on.
C. DCL command procedures embedded in a mail message will be automatically executed during
user login unless the system manager defines the system logical name MAIL$DCL_DISABLE to TRUE.
D. Buffer overflows caused by out of specification message attachments may allow arbitrary code
to be executed without prompting the recipient.
Answer: A
QUESTION 2
Which two object classes can have audit events applied to them? Select two.
A. logical name tables
B. logical names
C. global sections
D. event flags
E. locks
Answer: A,C
QUESTION 3
On a system with user file activity across several volumes, which command or utility can a system
manager use to determine what files a process currently has open across all disk volumes?
A. SHOW DEVICE/FILES/NOSYSTEM *
B. ANALYZE /PROCESS
C. MONITOR FILE_SYSTEM_CACHE/ALL
D. ANALYZE /SYSTEM
Answer: D
QUESTION 4
What two items should be included in an organization's Configuration Management records?
Select two.
A. software assets
B. staff contact details
C. details of support contracts
D. physical assets
E. organizational chart
Answer: A,D
QUESTION 5
Which two are the correct descriptions for L and P when discussing a device protection mask
(RWLP)? Select two.
A. P = protected (allows access to protected devices)
B. L = logical (allows access to logical blocks)
C. P =passall (allows unlimited access to specified devices)
D. P = physical (allows access to physical blocks)
E. L = local (allows access from the local system only)
F. L = limited (allows limited access to specified devices)
Answer: B,D
Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com
No comments:
Post a Comment