Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Question 1
- 0 out of 1 points
- The security role which designs, plans and implements z/OS security is _____.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Security administrator
- Question 2
- 0 out of 1 points
- The security role that has been assigned the SPECIAL attribute in their profiles is a _____.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Security administrator
- Question 3
- 0 out of 1 points
- The security role which is responsible for reviewing security policy, violation and exposures is ______.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Security auditor
- Question 4
- 0 out of 1 points
- The security role which is responsible for entering system commands at console to control the operation of z/OS is ______.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct System operator
- Question 5
- 0 out of 1 points
- z/OS directly provides all of the following security and integrity controls beyond facilities provided by the IBM Security Server or RACF, except?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct z/OS Firewall Technologies
- Question 6
- 0 out of 1 points
- Resource Access Control Facility (RACF) is a part of _______?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct IBM Security Server
- Question 7
- 0 out of 1 points
- Which of the following statements BEST describes z/OS's Authorized Program Facility (APF)?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Ability to identify system or user programs that can use sensitive system functions.
- Question 8
- 0 out of 1 points
- Which of the following statements concerning z/OS's Authorized Program Facility (APF) is TRUE?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct All of the answers are TRUE.
- Question 9
- 0 out of 1 points
- Which of the following statements BEST describes z/OS's storage protection function?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Prevents unauthorized reading or alteration of real memory.
- Question 10
- 0 out of 1 points
- Which of the following statements concerning z/OS's storage protection is FALSE?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Storage protection keys are used to encrypt the contents real memory to prevent un-authorized system or user programs from reading the contents of the page.
- Question 11
- 0 out of 1 points
- Programs assigned a storage protection key of 0 (the Master key), which is assigned to z/OS BCP programs, can store or alter content anywhere. To provide additional protection to prevent real memory alteration even from master key programs, what additional storage protection may be used?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Page protection bit
- Question 12
- 0 out of 1 points
- Which of the following statements concerning z/OS's cross-memory communication protection is TRUE?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct All of the statements are TRUE
- Question 13
- 0 out of 1 points
- In RACF, a _____________ describes the security characteristics of a user, a group, or resource.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct profile
- Question 14
- 0 out of 1 points
- A hardcopy document or electronic set of security rules that are used to guide or implement security is called a ________?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct security policy
- Question 15
- 0 out of 1 points
- The security concept which ensures that individuals don't have conflicting responsibilities or are responsible for reporting on themselves or their superior is called ______?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct separation of duties
- Question 16
- 0 out of 1 points
- All of the following are typical RACF security services, except?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Prevents connections from outside the network to access sensitive applications.
- Question 17
- 0 out of 1 points
- RACF can be configured to write to a security log when it detects _______?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Any of the listed events.
- Question 18
- 0 out of 1 points
- A security policy should ______.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct include all of the presented options
- Question 19
- 0 out of 1 points
- Concerning the security policies recommended for systems programs, which of the following statements is FALSE?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct System programs are normally stored in a RACF security database.
- Question 20
- 0 out of 1 points
- Which of the following statements BEST describes the concept of "console security"?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Specifies z/OS commands can execute at a designated console.
- Question 21
- 0 out of 1 points
- Which of the following statements BEST describes the concept of a "Problem State"?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct It is normally any user program that is executed with storage protection key of 8.
- Question 22
- 0 out of 1 points
- Concerning the security of application programs, which of the following statements is FALSE?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Application programs normally use a storage protection key between 0 and 7.
- Question 23
- 0 out of 1 points
- While of the following is NOT an example of a RACF protected resource?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Users and groups
- Question 24
- 0 out of 1 points
- In order for a resource to be RACF-protected, it must
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct have a RACF profile
- Question 25
- 0 out of 1 points
- ALLOC, CONTROL, WRITE, READ, and NONE are examples of which RACF concept?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct RACF permissions
- Question 26
- 0 out of 1 points
- INFO, SYS, IO, CONS, MASTER are examples of which RACF concept?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct RACF CONSOLE authority or command levels
- Question 27
- 0 out of 1 points
- Concerning SNA (System Network Architecture) which of the following statements is FALSE?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct SNA was the first network architecture, but when TCP/IP was introduced many years was replaced by.
- Question 28
- 0 out of 1 points
- TCP/IP identifies remote applications by a ________.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct socket
- Question 29
- 0 out of 1 points
- SNA identifies a remote application by a ________.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct program interface
- Question 30
- 0 out of 1 points
- SNA identifies a remote host by a ________.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct logical unit (LU)
- Question 31
- 0 out of 1 points
- TCP/IP identifies a remote host by a ________.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct IP address
- Question 32
- 0 out of 1 points
- Which of the following statements BEST describes the concept of TN3270E?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct The TCP/IP application protocol used to transmit IBM 3270 terminal data streams across TCP/IP networks.
- Question 33
- 0 out of 1 points
- Which of the following statements BEST describes Virtual Telecommunications Access Method (VTAM)?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct An IBM subsystem that implements Systems Network Architecture (SNA)
- Question 34
- 0 out of 1 points
- The IBM subsystem that permits z/OS to integrate TCP/IP and SNA is _____?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct z/OS Communication Server (CS)
- Question 35
- 0 out of 1 points
- A layered network model like OSI, TCP/IP and SNA provides a way to categorize network and communication functions using a hierarchical approach. How many network layers are specified in the SNA architecture?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct 7
- Question 36
- 0 out of 1 points
- The Network layer of the TCP/IP and OSI models are used to specification used to uniquely identify network components and techniques (algorithms) to routing data routing between network components. Which of the following SNA layers is the most comparable to the TCP/IP and OSI network layer?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Path Control layer.
- Question 37
- 0 out of 1 points
- SNA identifies three types of Network Addressable Units (NAUs). Which of the following statements is FALSE concerning SNA Network Address Units?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Logical units (LUs) identifies SNA network components by software and physical units (PUs) identifies SNA components by hardware or firmware.
- Question 38
- 0 out of 1 points
- The concept of a TCP/IP socket or port is most similar compared to a ______?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Logical unit (LU)
- Question 39
- 0 out of 1 points
- Concerning the concept of a SNA physical units (PUs), which of the following statements is FALSE?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct A PU is a centralized SNA component that controls and routes communication through an SNA domain.
- Question 40
- 0 out of 1 points
- The collection of SNA components that is managed by a system services control point (SSCP) is called a ________?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct domain
- Question 41
- 0 out of 1 points
- The Synchronous Data Link Control (SDLC) protocol is responsible for controlling the bit-by-bit transmission of frames. SDLC provides services similar to which TCP/IP or OSI layer?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Data Link Layer
- Question 42
- 0 out of 1 points
- SDLC is most similar to which network component or service?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Ethernet
- Question 43
- 0 out of 1 points
- Data is routed between SNA physical units within a SNA domain by a _______.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct System Services Control Point (SSCP)
- Question 44
- 0 out of 1 points
- System Services Control Point (SSCP) services are provided by __________.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct z/OS Communication Server
- Question 45
- 0 out of 1 points
- Historically, a mainframe used only one VTAM domain. As the complexity of VTAM networks expanded there was a need to connect multiple VTAM domains. Each VTAM domain connected to a VTAM network is called a _____.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct subarea
- Question 46
- 0 out of 1 points
- Which type of SNA node is used to interconnect subareas?
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Type 4 (T4)
- Question 47
- 0 out of 1 points
- Subarea VTAM network designs Advanced Program-to-Program Communications (APPC) and Advanced Peer-to-Peer Networks (APPN). The advantages of APPC and APPN include
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct All of the statements describe advantages of APPC and APPN
- Question 48
- 0 out of 1 points
- VTAM commands can be entered using SDSF and used to monitor and gather information of VTAM nodes, APPN topologies, subarea sessions (SSCP-SSCP, LU-LU, CP-CP) and VTAM exit routines begin with _______.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct /D NET,
- Question 49
- 0 out of 1 points
- VTAM commands can be entered using SDSF and used to activate or deactivate VTAM resources begin with _______.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct /V NET,
- Question 50
- 0 out of 1 points
- VTAM commands can be entered using SDSF and used to change VTAM options, tables, storage and traces begin with _______.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct /V NET,
- Question 51
- 0 out of 1 points
- The traditional TCP/IP commands, i.e., netstat, ping and tracert, can be entered using _______.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct TSO and OMVS
- Question 52
- 0 out of 1 points
- In order to start a UNIX command shell one would enter the ______ command.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct TSO OMVS
- Question 53
- 0 out of 1 points
- TSO commands that can report TCP/IP utilization information, port information and status, routes, etc. begin with _______.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct DISPLAY TCPIP
- Question 54
- 0 out of 1 points
- TSO commands that modify TCP/IP parameters or start and stop sockets and communication TCP/IP devices begin with _______.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct VARY TCPIP
- Question 55
- 0 out of 1 points
- IP addresses that are not dependent to a physical network device and can provide flexibility in load balancing and recovery services when a physical network device fails are called ______.
- Selected Answer:
- Incorrect [None Given]
- Correct Answer:
- Correct Dynamic IP addresses
- Thursday, December 14, 2017 5:49:26 PM EST
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement