[1/29] Which of the following fields is not in a digital certificate?
[2/29] Which of the below functions can a PKI Services administrator not perform?
Revoke a certificate
Update a request
Modify a certificate
Approve a request
[3/29] Which of the following could be susceptible to a buffer overflow if left unchecked?
PC routines with variable length parameters
Web servers with variable length interfaces
All of them
Null terminated strings
[4/29] In what security immune system domain does Data Set Encryption reside?
Identity and Access
[5/29] Resource managers make security requests through the set of interfaces called the ____
ESM: External Security Manager
SAF: System Authorization Facility
CIA: Confidentiality Integrity and Availability subsystem
TCB: Trusted computing base
[6/29] After you are done reading and writing your data securely using System SSL APIs, what is the first step you should take?
Close the environment
Close the connection
Shutdown the connection
Shutdown the environment
[7/29] What is the recommended method for assigning superuser authority?
Using the BPX.DAEMON resource in the FACILITY class
Using UNIXPRIV profiles
Assigning a uid of 0
Using the BPX.SUPERUSER resource in the FACILITY class
[8/29] What is “privilege creep”?
A condition when access failures generate a large number of alerts
A gradual accumulation of access rights beyond what an individual needs to do his job
When the process to grant system access is really slow
When a system admin spies on other users without their knowledge
[9/29] How can a user configure the default priority of security providers?
A user cannot change the priority of security providers
Change the order of the provider list in the java.security file
Change the order of the provider jar files in the classpath
Change the order of the provider list in the java.policy file
[10/29] What is the name of the encryption hardware accelerator available on each microprocessor of the z14 providing up to 7x performance?
[11/29] Your AT-TLS policy can specify which of the following?
Time of day
All of these and more
[12/29] What is the most important part of symmetric key encryption?
The same key is used for encrypt and decrypt operations
There is no key for this type of encryption
Each encryption creates a unique key
A different key is used for encrypt and decrypt operations
[13/29] Which of the following algorithms is NOT specified in a cipher suite definition?
[14/29] How many levels of indirect parameters are trusted on entry to a PC available to unauthorized callers?
The first one
None of them
All of them
The first three
[15/29] Which keyword determines whether an unauthorized requester can invoke the PC?
[16/29] Which information is NOT collected by zERT?
[17/29] Which of the following is not considered a sensitive resource to RACF's health check of the same name?
System Rexx dataset
[18/29] Which of the following ENQ QNames is most appropriate for an authorized program?
[19/29] Which is a way to access and modify RACF data from the network?
IBM Tivoli Directory Server for z/OS
[20/29] Which of the following is an attack where a malicious user attempts to either guess or confirm valid users in a system?
user enumeration attack
[21/29] Which General Register might be trusted on entry to a PC routine?
[22/29] Which of the following is not found in the z/OS CVSS Data file available from the IBM Z Security Portal?
[23/29] What is a common asymmetric key encryption algorithm?
All of them
[24/29] When an authorized user requests data from Db2 using SQL that is encrypted on disk they will see...
An SQL Error code
Data in the clear
No data will be returned
[25/29] What is the best way to verify the address of a control block provided by an untrusted requester?
Run an independent chain to match the address
Check the eye catcher
Make a safe copy
Test the storage key
[26/29] Why should I subscribe to the IBM Z Security Portal?
To review all CVEs
To hack z/OS applications
To get notified of the latest security information
To gain access to CVSS data
[27/29] Which of the following is not a type of KDS?
[28/29] The ability to eliminate the storage administrator from the compliance scope is found at what layer of encryption?
Full disk & tape
File or data set
[29/29] Which of the following is not a property of authorization?
Badge Certification Score