Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

HP HP0-766 Exam - Cheat-Test.com

Free HP0-766 Sample Questions:

Q: 1 NonStop Kernel system users fall into a number of classes, indicated by the Userid. What is true for Group managers?
A. The Userid is 255,254.
B. The Userid is m,255 where m in an integer from 1 to 254.
C. The Userid is 255,n where n is an integer from 1 to 254.
D. The Userid is m,n where m and n are integers from 1 to 254.
Answer: B

Q: 2 Which statement is true if the global SAFEGUARD setting PASSWORD-REQUIRED = ON?
A. A password is required to log on as a Super ID.
B. A password is required for all users to log on to the system.
C. A password is required for a super ID or group manager ID to log on as another user.
D. A password is required to log on only if PASSWORD-MINIMUM-LENGTH is set greater than zero.
Answer: C

Q: 3 What does an Alias inherit from the linked Userid? Select TWO.
A. the local access capabilities of the Userid
B. the remote access authority of the Userid
C. the same CAID/PAID as the Userid
D. the ability to change the owner of the Userid
E. the ability to remove the Userid from any ACL
Answer: A, C

Q: 4 Which statement is true about an Alias if the Userid it is linked to is frozen?
A. The Alias is automatically frozen.
B. It is still possible to logon as the Alias.
C. The Alias is automatically frozen at the next logon.
D. The alias can thaw the frozen Userid to which it is linked.
Answer: B

Q: 5 Which Safeguard configuration attribute forces privileged Userids to always use a password when they authenticate as another user?
A. LOGON-PASSWORD-MANDATORY
B. PASSWORD-REQUIRED
C. AUTHENTICATE-PASSWORD-MANDATORY
D. AUTHENTICATE-PASSWORD-REQUIRED
Answer: B

Q: 6 What is the name of the iTP Secure WebServer utility used for password administration?
A. wsadmin
B. webadmin
C. secadmin
D. useradm
Answer: D

Q: 7 A user is added with the following specified in the User configuration record:
PASSWORD-MUST-CHANGE EVERY 30 DAYS
PASSWORD-EXPIRY-GRACE 29 DAYS
When is the user allowed to change the password?
A. today only
B. within 29 days
C. within 30 days
D. within 59 days
Answer: D

Q: 8 Which Safeguard configuration attribute is used to hide passwords during logon?
A. LOGON-PASSWORD-HIDDEN
B. LOGON-PASSWORD-BLIND
C. AUTHENTICATE-PASSWORD-HIDDEN
D. BLINDLOGON
Answer: D

Q: 9 Which statement about the FTP server is true when a user name appears in the $SYSTEM.ZTCPIP.FTPUSERS file?
A. It allows access to the configured FTP services.
B. It rejects access without authenticating the user definition.
C. It allows access without authenticating the user definition.
D. It rejects access if the user does not have execute permission.
Answer: B

Q: 10 If an OBJECTTYPE USER record exists, which criteria must the person executing an ADD ALIAS command meet to complete the task successfully? Select TWO.
A. be a super-group user
B. be the SECURITY-ADMINISTRATOR
C. be the owner of the underlying Userid
D. be a group member of the underlying Userid
E. have CREATE authority on the OBJECTTYPE USER access control list
Answer: C, E

Q: 11 When does Safeguard calculate a new PASSWORD-EXPIRES date? Select TWO.
A. each time the password is changed
B. when the PASSWORD-MUST-CHANGE attribute is added or changed
C. when a Userid is frozen
D. each time Safeguard is started
Answer: A, B

Q: 12 Which disk file security vector is available within OSS?
A. Safeguard Access Control Lists (ACLs)
B. Read/Write/Execute/Purge (RWEP)
C. Read/Write/Execute/Read/Write/Execute/Read/Write/Execute (rwxrwxrwx)
D. Linux Access Control Lists (ACLs)
Answer: C

Q: 13 Which Guardian security vector will allow any local user on the system to execute a program?
A. RWPE
B. NONO
C. RWX
D. NOAO
E. NUUN
Answer: D

Q: 14 What is the function of the 'Diver' program?
A. It starts a diving game that takes up substantial system resources.
B. It crashes the CPU that it is started in and primes it for reloading.
C. It exercises the ServerNet connection of the CPU that it is started in.
D. It creates a simulated load on the system for application testing purposes.
Answer: B

Q: 15 Which conditions must be met before a non-owner of an OSS file is allowed to remove it? Select TWO.
A. write permission to the file
B. file is not in use
C. execute permission to the directory
D. sticky bit is turned on for the directory
Answer: A, C

Q: 16 Which function does SNOOP allow?
A. to monitor system performance
B. to monitor logon attempts
C. to examine and alter TMF audit trails
D. to view security errors
E. to view TCP/IP traffic
Answer: C

Q: 17 Which parameter is used to allow non-privileged users access to privileged or callable procedures?
A. LICENSE
B. PROGID
C. SECURE
D. REVOKE
Answer: A

Q: 18 Which actions cause a message to be sent to $CMON? Select TWO.
A. authenticating through TACL
B. authenticating through FTP
C. calling 'NEWPROCESS' directly to run a program
D. running a program from the OSS Shell (OSH)
E. issuing the ALTPRI command through TACL
Answer: A, E

Q: 19 Which security attribute settings for a PATHWAY object owned by 66,1 allow it to be run by local user 200,1? Select TWO.
A. A
B. X
C. N
D. NONO
E. AOAO
Answer: A, C

Q: 20 Which factors are part of the data protection provided by the protection view? Select THREE.
A. CHECK option
B. SECURE option
C. security string of the underlying table
D. the number of the underlying tables used in the view
E. view columns
F. table rows
Answer: A, B, E

Q: 21 What can a SYSTEM-OPERATOR security group member do? Select TWO.
A. alter the Audit Service
B. alter Safeguard global settings
C. add an audit pool
D. add a Safeguard terminal
E. release an audit trail file
Answer: C, E

Q: 22 Which access authorities are valid for a disk file ACL?
A. ****
B. NUNU
C. RXPWCO
D. RWEPCO
E. RWEPGO
Answer: D

Q: 23 Safeguard is running on the DSM/SCM target system. What is required to protect the files in the new configuration with Guardian security instead of Safeguard?
A. Stop Safeguard;
FUP SECURE the files;
Restart Safeguard.
B. Do a FUP SECURE with the ignore-safeguard option.
C. Make sure no disk files are protected with PERSISTENT ON;
Then do:
> PATHCOM $YPHI
= ALTER ta-001, PARAM "ignore-safeguard-protection"
D. Use INITENV with the change option.
Answer: C

Q: 24 Which Safeguard global parameters should be set for a secure system? Select THREE.
A. SAFEGUARD-SECURITY ON
B. PASSWORD-REQUIRED ON
C. GUARDIAN-SECURITY OFF
D. PASSWORD-MINIMUM-LENGTH [value]
E. PASSWORD-ENCRYPT ON
F. REMOTE-PASSWORD-REQUIRED ON
Answer: B, D, E

Q: 25 What is the security risk if a privileged process calls DEBUG?
A. None, the process halts to prevent user access to privileged code.
B. None, a non-privileged user that has access to the HOMETERM of the process only can resume the process.
C. Anyone who has access to the HOMETERM of the process can read and alter possibly sensitive data.
D. Anyone who has access to the HOMETERM of the process becomes a privileged user while in DEBUG.
Answer: C

Q: 26 Which statement describes OSS security?
A. It has its own file system, provides a second set of interfaces to the NonStop OS, and supports some Safeguard functionality.
B. It is a second operating system that sits on top of Guardian and is subject to all Guardian security controls.
C. It has its own file system, provides a second set of interfaces to the NonStop OS, and is subject to all Safeguard security controls.
D. OSS is a second operating system that sits on top of Guardian and requires Safeguard.
Answer: A

Q: 27 How is the default DSM/SCM Userid changed?
A. FUP GIVE all files on the DSM/SCM subvol to the new DSM/SCM Userid.
B. Create the Safeguard ACLs for the new DSM/SCM Userid.
C. Use INITENV with the change option.
D. Only the Superid can be the DSM/SCM Userid.
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved