In an effort to audit access to a number of objects on an iSeries, the system administrator has used the Change Object Auditing command to specify the auditing level of the objects. Prior to changing the auditing control (QAUDCTL) system value from *NONE to *OBJAUD, what additional step must be performed?
Ensure that the QAUDJRN journal exists
Ensure that the QAUDIT subsystem is started
Ensure that the security auditing level (QAUDLVL) system value is not set to *NONE
Ensure that the system security level (QSECURITY) system value is set to 30 or higher
An administrator has decided to move an iSeries to security level 40 and the Chief Information Officer (CIO) has asked the administrator to identify any potential program issues before moving to level 40. Which system values and options must be set to allow identification of potential program failures?
Auditing control (QAUDCTL) *OBJAUD and Security auditing level (QAUDLVL) *NXTLVL
Auditing control (QAUDCTL) *OBJAUD and Security auditing level (QAUDLVL) *PGMFAIL
Auditing control (QAUDCTL) *AUDLVL and Security auditing level (QAUDLVL) *AUTFAIL
Auditing control (QAUDCTL) *AUDLVL and Security auditing level (QAUDLVL) *PGMFAIL
Security policy requires that the system console be monitored for invalid sign-ons and immediate notification be sent to operations and system administration. The system console is a twinaxial-attached 5250 display. Which of the following will meet this requirement?
Create data queue QSYS/QSYSNTFY and monitor with a program to send sign-on violation notifications.
Create QSYS/QSYSMSG message queue and monitor with a program to send sign-on violation notifications.
Create an exit program for the QIBM_QZSO_SIGNON server to monitor sign-ons and send notifications when an invalid sign-on is detected.
Create an exit program for the QIBM_QTG_DEVINIT exit (Telnet device initialization) that sends notifications when an invalid sign-on occurs.
A system administrator suspects that objects in library QSYS are being replaced in an attempt to compromise security. What method can the administrator use to monitor for this activity?
Activate the audit journaling function
Change suspect user profiles to limit capability
Change the system history log function to *PROTECT
Change the public access to the QSYS library to *EXCLUDE
Exit programs can be used to provide an extra layer of security beyond object security. However, exit programs can also be created and used in a malicious manner to implement a virus or steal password information. What command could an administrator use to check for the use of exit programs?
After upgrading to OS/400 V5R2, iSeries Access terminal emulation users have a pop-up message "Error Occurred when retrieving usage information." Which of the following is the most likely cause of the problem?
Users are still enrolled to use the Microsoft Windows 95/NT client.
The license limits for 5722-XW1 were not reset after the installation.
INZSYS did not complete successfully after the new release was installed.
An installed exit program is denying access to data used by the iSeries Access startup.
An object in the root file system has the read-only attribute set. Which of the following actions must be taken so that the object can be deleted using an OS/400 command?
Obtain *ALLOBJ authority
End the iSeries NetServer 18
Use Windows Explorer to remove the read-only attribute
Use the RMVLNK command so that the object is accessible to OS/400 commands
Under iSeries Navigator NetServer options, which of the following allows directories of the IFS to be managed and secured for access by PC's using Windows Explorer?
When connecting an iSeries system to a network it is important to provide for maximum bandwidth. Which of the following connections would best satisfy this requirement?
1Gb full duplex to a hub
1Gb half duplex to a hub
1Gb full duplex to a switch
1Gb half duplex to a switch
A customer has an iSeries on the Internet side of a firewall and another on the secure side. The two systems are to be connected via SNA for nightly updates using communications with a direct connection so the link can be easily varied off when not in use. Which of the following pieces of hardware is needed in addition to communications lines on each system?
null modem adaptor
A site has a remote workstation controller connected with AnyNet over their frame relay network. Whenever the frame network drops and the ISDN backup is enabled, the controller loses connection to the system. Which setting should be modified to allow the controller to reconnect automatically?
The QCMNARB system value
The QCMNRCYLMT system value
The HPR path switch timers on the controller
The REDIALDLY parameter of the controller description
Which of the following commands will limit the number of automatically created 5250 Telnet sessions to 50?
CHGSYSVAL SYSVAL(QAUTORMT) VALUE(50)
CHGSYSVAL SYSVAL(QAUTOCFG) VALUE(50)
CHGSYSVAL SYSVAL(QAUTOVRT) VALUE(50)
For security reasons an administrator has set the system values QDSCJOBITV to 120, QINACTMSGQ to *DSCJOB, and QINACTITV to 60. When will the user be disconnected due to inactivity?
What iSeries Navigator policy is required to permit a user on system "A" to pass through to system "B" without re-entering their user ID and password?
The user profiles and passwords on the two systems must be identical.
The user profiles on the two systems must be set to have the same passwords.
"Use Pass-through for remote sign on" must have "Allow signon to be bypassed" selected.
"Use Pass-through for remote sign on" must have "verify user ID on target system" selected.
A system administrator needs to set up an iSeries as a DHCP server. Which of the following is used to accomplish this task?
Use the CFGDHCP command.
Use the "Configure DHCP" option on the CFGTCP menu.
Use "Network>Servers>TCPIP>DHCP" in iSeries Navigator.
Use "Configuration and Services>TCPIP>DHCP" in iSeries Navigator.
An iSeries administrator needs to configure a DNS server. Which of the following is used to accomplish this task?
"Network>Servers>DNS" in iSeries Navigator
"Configuration and Services>DNS" in iSeries Navigator
"Configure Domain Name Server" option on the CFGTCP menu
000-355 IBM iSeries System Administration V5R2