Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "HP0-336" Exam

Good collection site itcertkeys

 Question 1.
In Select Identity, an entitlement is .

A. an abstraction of the resource privileges granted to an identity
B. an abstraction that organizes privileges and permissions, and controls authorization
C. a Select Identity concept that defines a logical grouping of users that can access a service
D. a Select Identity abstraction that defines how a logical grouping of users will access a Select 
     Identity service
E. a name-value pair that can be created or changed at runtime in a workflow instance through 
     actions, a workflow API call, or returned by an application invocation

Answer: A

Question 2.
Which four design patterns does Select Identity leverage that promote adaptability, modularity, extension and reuse? (Choose four.)

A. dynamic user grouping
B. n-tier administration delegation
C. resource-centric user provisioning
D. services-based resource abstraction
E. fixed, variable and rule-based entitlement assignment
F. role-based access control (RBAC) entitlement assignment

Answer: A, B, D, E

Question 3.
Which process should be used to load existing user accounts from a resource into Select Identity?

A. bulk add
B. bulk move
C. reconciliation
D. auto-discovery

Answer: D

Question 4.
Which performance optimization is most likely to improve the speed of user lookups from Select Access at the time of authentication?

A. use SSL between the Validators and the directory server
B. use a directory server that is also a Windows domain controller
C. configure the Validator to failover from one directory server to another
D. index the most frequently-searched user attributes in the directory server

Answer: D

Question 5.
Which four statements are true about Select Access setup? (Choose four.)

A. The setup program contains a repair facility to restore initial setup.
B. The setup program can be run centrally to install Web Server Enforcers.
C. The Select Access setup tool de-registers components that are being uninstalled.
D. The setup program should generally be run on every server that will host a Select Access 
     component.
E. The Select Access setup program should only be run with UNIX root or Windows Administrator  
    privilege.
F. A Java runtime environment should be installed before using the setup program to install an  
    Audit Server.

Answer: A, C, D, E

Question 6.
What are three competitive advantages of the Open View Identity Management solution?
(Choose three.)

A. modularity - manage discretely or collectively
B. simplification - ease of use/ease of integration
C. centralized control - manage all network devices
D. automated updates - push software updates to affected systems
E. open architecture - standards-based components and processes

Answer: A, B, E

Question 7.
Which type (s) of services can be created in Select Identity?

A. business service only
B. consumer service only
C. composite service only
D. business service and composite service
E. composite service and consumer service

Answer: D

Question 8.
When performing a user search with no search criteria specified in Select Identity, it takes more than 30 seconds to return.

Assuming that 100000 users have already been loaded into the system, what is the most likely source of the degradation in performance?

A. database
B. load balancer
C. network latency
D. application server

Answer: A

Question 9.
Your client needs to create a new attribute called Employee Type, which can only be populated with one of five possible values.

Which type of function should you use to meet this requirement?

A. value validation function
B. value limitation function
C. value constraint function
D. value generation function
E. value verification function

Answer: C

Question 10.
Which two statements are true about the Select Access Rule Builder? (Choose two.)

A. It is possible to add new types of authentication servers using the Rule Builder.
B. Both access policy rules as well as workflow rules can be created using the Rule Builder.
C. The Rule Builder is a graphical interface that allows creation of conditional access rules.
D. The Rule Builder requires administrators to input rules by typing them in a specific syntax with  
    Boolean operators such as AND OR.

Answer: B, C

Question 11.
Company A wants to allow administrators of Company B to add Company B employees to the Select Access user repository of Company A. No other administration capability needs to be delegated.

Which two actions achieve this result? (Choose two.)

A. allow Company B administrators to use the HTML forms-based administration interface only 
B. allow Company B administrators to use the HTML forms-based administration interface but  
     only for access policy management
C. allow Company B administrators to use the main Select Access administrator's applet and 
      restrict their capability to user administration only
D. allow Company B administrators to use the applet-based administration Policy Builder  
      interface only and restrict the capability to user administration only

Answer: A, D

Question 12.
What are two methods of discovering Web pages as Select Access resources? (Choose two.)

A. launch a scan of the HTTP Web pages from the Policy Builder
B. use a Validator plug-in to obtain the list of Web pages and store it directly in the LDAP 
     directory server
C. configure the Enforcer on the Web server to push the list of Web pages to the Policy Builder 
     via the Validator
D. import the list of Web pages into the Policy Builder from a text file containing URLs separated  
     by carriage returns

Answer: A, D

Question 13.
Which parameter of the Select Access Validator configuration should you alter to increase the frequency at which stale cache items are deleted from the Validator's cache?

A. client idle timeout
B. cache refresh interval
C. cache cleanup interval
D. maximum cache lifetime
E. cache cleanup percentage

Answer: C

Question 14.
Which three parameters can be configured in Select Identity's TruAccess.properties file?
(Choose three.)

A. the maximum number of retry attempts for sending e-mail
B. the database type used as the Select Identity data repository
C. the error message an administrator receives if an e-mail cannot be delivered
D. the time interval that the e-mail daemon uses for sending new e-mail if the initial attempt is 
     unsuccessful

Answer: A, B, D

Question 15.
Which statement is true about Select Access?

A. There can be no load balancing between Enforcers and Validators as only failover is possible.
B. Enforcers can failover and load balance between Validators, but the default configuration does 
    not include this.
C. Enforcers, by default, failover as well as balance load between all available Validators using 
    the round robin method.
D. For failover and load balancing to work between the Enforcers and Validators, an external 
     network load balancer must be used.

Answer: C

Question 16.
Which format is used by the initial user load process in Select Identity?

A. EDI
B. XML
C. LDIF
D. SPML
E. SNMP

Answer: D

Question 17.
The Select Access query tool can be easily used to test which three aspects of performance? (Choose three.)

A. Validator load
B. stress testing
C. application response time
D. Select Access internal communication

Answer: A, B, D


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for XK0-002 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "XK0-002" Exam

Linux+ Certification Exam (2005 Objectives)

 Question 1
A Linux technician would like to change the default lpr queue to print to a new printer. Which file should be edited to make this change?

A. /etc/printers/default.conf
B. /etc/vprint
C. /etc/printcap
D. /etc/lpd.conf

Answer: C

Question 2
Which of the following commands lists the file systems available for the NFS (Network File System) server upiter?

A. showmount e jupiter
B. ls -l jupiter
C. showmount -e jupiter
D. ls jupiter

Answer: C

Question 3
The man page for the is command states:
The full documentation for ls is maintained as a Texinfo manual.
Which of the following commands will retrieve the full documentation for the ls  command?

A. man -info ls
B. info ls
C. infoman ls
D. text ls

Answer: B

Question 4
A DHCP server has been added to the network. The local system has been reconfigured to connect using DHCP. How could an administrator restart network services and test that the interface and the DHCP server are functioning properly?

A. /bin/netstat -R; ping comptia.org
B. /usr/bin/network restart; ping comptia.org
C. /sbin/route restart; ifconfig lo
D. /etc/init.d/network restart; ifconfig eth0

Answer: D

Question 5
Which of the following files contains a list of file systems that can be currently mounted on the system if all supported modules have been loaded?

A. /etc/filesystems
B. /var/filesystems
C. /dev/filesystems
D. /proc/filesystems

Answer: D

Question 6
A user is unable to access the Internet from their Client. The client's TCP/IP settings are 192.168.1.87/26. The default gateway's IP address is 192.168.1.1. What command must be entered on the client machine to enable communications to the Internet?

A. ifconfig eth0 up 192.168.1.87 netmask 255.255.255.128
B. ifconfig eth0 up 192.168.1.1 netmask 255.255.255.0
C. ifconfig eth0 up 192.168.1.87 netmask 255.255.255.192 broadcast 192.168.1.255
D. ifconfig eth0 up 192.168.1.87 netmask 255.255.255.255

Answer: A

Question 7
Which of the following services commonly uses Port 22?

A. SMTP
B. DNS
C. FTP
D. SSH (Secure Shell)

Answer: D

Question 8
A newly created user, john, reports that he has access to the file ?var/mail/joe? but should not have this access. Which of the following MOST likely caused this?

A. User john was created with the same UID (User ID) as the removed user named joe.
B. User john and joe are sharing a home directory.
C. User john is forwarding all of his mail to joe.
D. User joe's email is still cached by the system although his UID (User ID) has been removed.

Answer: A

Question 9
Which of the following can be used to determine who has scheduled a job?

A. at -d
B. at -l
C. who
D. whodo

Answer: B

Question 10
Which of the following commands is used to search the whole directory structure to locate a specific file, but still can execute other commands while the 'find' command is searching for the file?

A. find filename > background
B. find / -name filename &
C. find / -name filename
D. find / filename &

Answer: B


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.