Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

IT330 Final Exam 2024;Graded A+ with complete solution

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
11-02-2024
Written in
2023/2024

IT330 Final Exam 2024;Graded A+ with complete solution All of the following are typical RACF security services, except? A. Identifies logon users via a USERID and password B. Each RACF USERID has a unique password C. Password is one way encrypted so no one else can get your password, not even the administrator D. Prevents connections from outside the network to access sensitive applications - firewall. E. A USERID is revoked after a preset number of invalid password attempts D In RACF, a _____________ describes the security characteristics of a user, a group, or resource. A. user account B. security entry C. profile D. SAF C In order for a resource to be RACF-protected, it must A. have a RACF profile B. have a password C. limit access to local connections D. define users and groups who may access the resource A The security role which is responsible for reviewing security policy, violation and exposures is ______. A. Security administrator B. Security auditor C. System operator D. Systems programmer E. System Administrator B Which of the following statements BEST describes z/OS's storage protection function? A. Limit access to sensitive datasets and libraries to authorized users and programs. B. Prevents unauthorized reading or alteration of storage C. Protects virtual address spaces from unauthorized access or alteration. D. Encrypts removable storage devices using the storage protection key. B Which of the following statements BEST describes the concept of "console security"? A. Specifies which z/OS commands operators can execute at a designated

Show more Read less
Institution
Course

Content preview

IT330 Final Exam 2024;Graded A+ with complete solution
All of the following are typical RACF security services, except?

A. Identifies logon users via a USERID and password
B. Each RACF USERID has a unique password
C. Password is one way encrypted so no one else can get your password, not
even the administrator
D. Prevents connections from outside the network to access sensitive
applications - firewall.
E. A USERID is revoked after a preset number of invalid password attempts
D
In RACF, a _____________ describes the security characteristics of a user, a
group, or resource.
A. user account
B. security entry
C. profile
D. SAF
C
In order for a resource to be RACF-protected, it must

A. have a RACF profile
B. have a password
C. limit access to local connections
D. define users and groups who may access the resource
A
The security role which is responsible for reviewing security policy, violation and
exposures is ______.

A. Security administrator
B. Security auditor
C. System operator
D. Systems programmer
E. System Administrator
B
Which of the following statements BEST describes z/OS's storage protection
function?
A. Limit access to sensitive datasets and libraries to authorized users and
programs.
B. Prevents unauthorized reading or alteration of storage
C. Protects virtual address spaces from unauthorized access or alteration.
D. Encrypts removable storage devices using the storage protection key.
B
Which of the following statements BEST describes the concept of "console
security"?
A. Specifies which z/OS commands operators can execute at a designated

, console.
B. Specifies z/OS USERIDS may login to a designated console.
C. Specifies groups and userids that logon to a designated console.
D. Specifies the time of day one may logon to a designated console.
E. All of answers are correct.
A
Which of the following is NOT an example of a RACF protected resource?
A. datasets and tapes
B. JES or TSO
C. IMS or CICS transactions
D. Console and system commands
E. Users and groups
E
A security policy should ______.
A. determine which RACF functions to use
B. identify the level of RACF protection
C. identify which data to protect
D. identify administrative structures and users
E. include all of the presented options
E
Concerning the security of application programs, which of the following
statements is FALSE?

A. Application programs may or may not be stored in an APF-library
B. Application programs are normally executed in problem state.
C. Application programs normally use a storage protection key between 0 and 7.
D. Applications programs are normally developed by IBM customers or third-
parties.
C
z/OS directly provides all of the following security and integrity controls beyond
facilities provided by the IBM Security Server or RACF, except?

A. Authorized Program Facility
B. Storage Protection
C. Cross-memory communication
D. MS Windows Firewall Technologies
D
Which of the following statements concerning z/OS's storage protection is
FALSE?
A. Information for each 4 KB page of real storage is protected from unauthorized
use by means of multiple storage protection keys.
B. Storage protection keys are used to encrypt the contents of real memory to
prevent un-authorized system or user programs from reading the contents of the
page.
C. z/OS uses 16 storage protection keys.A specific key is assigned according to
the type of work being performed.

Written for

Course

Document information

Uploaded on
February 11, 2024
Number of pages
9
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.98
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
katoinyambi96 stuvia
Follow You need to be logged in order to follow users or courses
Sold
49
Member since
2 year
Number of followers
31
Documents
1267
Last sold
4 months ago

4.5

6 reviews

5
4
4
1
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions