www.CertifySchool.com Certification Preparation Material (PDF)
HP HP0-276 Exam OpenVMS Security Administration
Edition = DEMO Full Version Features: 90 Days Free Updates 30 Days Money Back Guarantee Instant Download Once Purchased 24 Hours Live Chat Support
Demo Product – For More Information – Visit link below:
http://www.certifyschool.com/exam/HP0-276/
http://www.certifyschool.com/exam/HP0-276/
Page | 1
www.CertifySchool.com Certification Preparation Material (PDF) Question: 1 Why could OpenVMS Mail be considered a security risk? A. OpenVMS Mail allows unprivileged unauthenticated (but potentially traceable) remote users to test for valid usernames. B. OpenVMS Mail allows unprivileged unauthenticated remote users to see who is actively logged on. C. DCL command procedures embedded in a mail message will be automatically executed during user login unless the system manager defines the system logical name MAIL$DCL_DISABLE to TRUE. D. Buffer overflows caused by out of specification message attachments may allow arbitrary code to be executed without prompting the recipient.
Answer: A Question: 2 Which two object classes can have audit events applied to them? Select two. A. logical name tables B. logical names C. global sections D. event flags E. locks
Answer: A,C Question: 3 On a system with user file activity across several volumes, which command or utility can a system manager use to determine what files a process currently has open across all disk volumes? A. SHOW DEVICE/FILES/NOSYSTEM * B. ANALYZE /PROCESS C. MONITOR FILE_SYSTEM_CACHE/ALL D. ANALYZE /SYSTEM
Answer: D Question: 4 What two items should be included in an organization's Configuration Management records? Select two. A. software assets B. staff contact details C. details of support contracts D. physical assets E. organizational chart
http://www.certifyschool.com/exam/HP0-276/
Page | 2
www.CertifySchool.com Certification Preparation Material (PDF) Answer: A,D Question: 5 Which two are the correct descriptions for L and P when discussing a device protection mask (RWLP)? Select two. A. P = protected (allows access to protected devices) B. L = logical (allows access to logical blocks) C. P =passall (allows unlimited access to specified devices) D. P = physical (allows access to physical blocks) E. L = local (allows access from the local system only) F. L = limited (allows limited access to specified devices)
Answer: B,D Question: 6 DRAG DROP Click the Task button. You need to break into a system when none of the accounts or passwords are known. Using drag and drop, place the steps in the correct sequence to accomplish this.
Answer:
http://www.certifyschool.com/exam/HP0-276/
Page | 3
www.CertifySchool.com Certification Preparation Material (PDF) Question: 7 By default, what happens to system activity if the audit server's log destination runs out of disk space? A. all batch jobs are suspended B. normal operation continues, oldest audits are discarded C. system crashes to protect integrity of auditing records D. audit-generating user processes are suspended
Answer: D Question: 8 The DCL command DIR 0:: fails with the error message %SYSTEM-F-LINKEXIT, network partner exited. Why could this happen? A. no proxy B. attempts to create a NETSERVER.LOG with a version number over 32767 C. proxy into non-existent target account D. protection violation on login command procedures
Answer: D Question: 9 A backup system disk copy is missing. What are two of the vulnerabilities that are introduced? Select two. A. passwords can be directly extracted from VMS$PASSWORD_HISTORY.DATA B. licenses can be extracted from LMF$LURT.DAT C. protected system files and data can be read D. usernames and their associated privileges can be listed E. passwords can be directly extracted from SYSUAF.DAT
Answer: C,D Question: 10 What is the purpose of "high water marking"? A. prevent an application from writing file data beyond the disk quota limit B. limit the use of XFC (eXtended File Cache) buffers C. prevent reading file data beyond the point in a file which has been written D. prevent a process from exhausting its FILLM quota
Answer: C Question: 11 http://www.certifyschool.com/exam/HP0-276/
Page | 4
www.CertifySchool.com Certification Preparation Material (PDF) Which two mechanisms allow authentication of network access to a system without explicit login? Select two. A. proxy account B. Advanced Server C. LDAP D. active directory E. SSH
Answer: A,E Question: 12 What are two backup and restore implications with respect to ACL-protected files? Select two. A. for correct ACL restoration, process must hold BYPASS privilege B. files need to be restored considering the security context (identifiers, etc) of the source system C. image backup preserves everything D. the security context (identifiers, etc) must be deleted prior to the ACL-protected files being restored E. non-image backup preserves everything
Answer: B,C Question: 13 A routine visit to investigate a report of poor network performance at a remote site indicates the network router has been replaced by a combined router/wireless access point. No one will admit to installing the access point, and it was left operating in default configuration. What should be the response to this situation? Select three. A. treat this as a security breach with potential unauthorized network access B. the original hardware configuration should be restored C. wait for the formal submission of a configuration control change request D. the person responsible for hardware change should be identified, and they should be reminded of Security Policy E. assume the performance problem is due to new consumer-class router/AP, and document for future reference
Answer: A,B,D Question: 14 What are three possible destinations for security audit events? Select three. A. accounting log B. security audit log C. error log D. audit listener E. operator log
Answer: B,D,E http://www.certifyschool.com/exam/HP0-276/
Page | 5
www.CertifySchool.com Certification Preparation Material (PDF) Question: 15 What are two elements of CLUSTER_AUTHORIZE.DAT? Select two. A. cluster authorized interconnects B. cluster account passwords C. cluster incarnation time D. cluster number E. cluster password
Answer: D,E
http://www.certifyschool.com/exam/HP0-276/
Page | 6
www.CertifySchool.com Certification Preparation Material (PDF)
Demo Product – For More Information – Visit link below:
http://www.certifyschool.com/exam/HP0-276/
Thanks for Using Our Product
http://www.certifyschool.com/exam/HP0-276/
Page | 7