Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "HP0-336" Exam

Identity Management

 Question 1.
In Select Identity, an entitlement is .

A. an abstraction of the resource privileges granted to an identity
B. an abstraction that organizes privileges and permissions, and controls authorization
C. a Select Identity concept that defines a logical grouping of users that can access a service
D. a Select Identity abstraction that defines how a logical grouping of users will access a Select 
     Identity service
E. a name-value pair that can be created or changed at runtime in a workflow instance through 
     actions, a workflow API call, or returned by an application invocation

Answer: A

Question 2.
Which four design patterns does Select Identity leverage that promote adaptability, modularity, extension and reuse? (Choose four.)

A. dynamic user grouping
B. n-tier administration delegation
C. resource-centric user provisioning
D. services-based resource abstraction
E. fixed, variable and rule-based entitlement assignment
F. role-based access control (RBAC) entitlement assignment

Answer: A, B, D, E

Question 3.
Which process should be used to load existing user accounts from a resource into Select Identity?

A. bulk add
B. bulk move
C. reconciliation
D. auto-discovery

Answer: D

Question 4.
Which performance optimization is most likely to improve the speed of user lookups from Select Access at the time of authentication?

A. use SSL between the Validators and the directory server
B. use a directory server that is also a Windows domain controller
C. configure the Validator to failover from one directory server to another
D. index the most frequently-searched user attributes in the directory server

Answer: D

Question 5.
Which four statements are true about Select Access setup? (Choose four.)

A. The setup program contains a repair facility to restore initial setup.
B. The setup program can be run centrally to install Web Server Enforcers.
C. The Select Access setup tool de-registers components that are being uninstalled.
D. The setup program should generally be run on every server that will host a Select Access 
     component.
E. The Select Access setup program should only be run with UNIX root or Windows Administrator  
    privilege.
F. A Java runtime environment should be installed before using the setup program to install an  
    Audit Server.

Answer: A, C, D, E

Question 6.
What are three competitive advantages of the Open View Identity Management solution?
(Choose three.)

A. modularity - manage discretely or collectively
B. simplification - ease of use/ease of integration
C. centralized control - manage all network devices
D. automated updates - push software updates to affected systems
E. open architecture - standards-based components and processes

Answer: A, B, E

Question 7.
Which type (s) of services can be created in Select Identity?

A. business service only
B. consumer service only
C. composite service only
D. business service and composite service
E. composite service and consumer service

Answer: D

Question 8.
When performing a user search with no search criteria specified in Select Identity, it takes more than 30 seconds to return.

Assuming that 100000 users have already been loaded into the system, what is the most likely source of the degradation in performance?

A. database
B. load balancer
C. network latency
D. application server

Answer: A

Question 9.
Your client needs to create a new attribute called Employee Type, which can only be populated with one of five possible values.

Which type of function should you use to meet this requirement?

A. value validation function
B. value limitation function
C. value constraint function
D. value generation function
E. value verification function

Answer: C

Question 10.
Which two statements are true about the Select Access Rule Builder? (Choose two.)

A. It is possible to add new types of authentication servers using the Rule Builder.
B. Both access policy rules as well as workflow rules can be created using the Rule Builder.
C. The Rule Builder is a graphical interface that allows creation of conditional access rules.
D. The Rule Builder requires administrators to input rules by typing them in a specific syntax with  
    Boolean operators such as AND OR.

Answer: B, C

Question 11.
Company A wants to allow administrators of Company B to add Company B employees to the Select Access user repository of Company A. No other administration capability needs to be delegated.

Which two actions achieve this result? (Choose two.)

A. allow Company B administrators to use the HTML forms-based administration interface only 
B. allow Company B administrators to use the HTML forms-based administration interface but  
     only for access policy management
C. allow Company B administrators to use the main Select Access administrator's applet and 
      restrict their capability to user administration only
D. allow Company B administrators to use the applet-based administration Policy Builder  
      interface only and restrict the capability to user administration only

Answer: A, D

Question 12.
What are two methods of discovering Web pages as Select Access resources? (Choose two.)

A. launch a scan of the HTTP Web pages from the Policy Builder
B. use a Validator plug-in to obtain the list of Web pages and store it directly in the LDAP 
     directory server
C. configure the Enforcer on the Web server to push the list of Web pages to the Policy Builder 
     via the Validator
D. import the list of Web pages into the Policy Builder from a text file containing URLs separated  
     by carriage returns

Answer: A, D

Question 13.
Which parameter of the Select Access Validator configuration should you alter to increase the frequency at which stale cache items are deleted from the Validator's cache?

A. client idle timeout
B. cache refresh interval
C. cache cleanup interval
D. maximum cache lifetime
E. cache cleanup percentage

Answer: C

Question 14.
Which three parameters can be configured in Select Identity's TruAccess.properties file?
(Choose three.)

A. the maximum number of retry attempts for sending e-mail
B. the database type used as the Select Identity data repository
C. the error message an administrator receives if an e-mail cannot be delivered
D. the time interval that the e-mail daemon uses for sending new e-mail if the initial attempt is 
     unsuccessful

Answer: A, B, D

Question 15.
Which statement is true about Select Access?

A. There can be no load balancing between Enforcers and Validators as only failover is possible.
B. Enforcers can failover and load balance between Validators, but the default configuration does 
    not include this.
C. Enforcers, by default, failover as well as balance load between all available Validators using 
    the round robin method.
D. For failover and load balancing to work between the Enforcers and Validators, an external 
     network load balancer must be used.

Answer: C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for HP0-J23 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "HP0-J23" Exam

Implementing MSA Storage Solution

 
Question 1.
What is the maximum number of users that can be logged into an MSA2012 (FC or iSCSI) controller at any one time?

A. 1 monitor and 5 manage
B. 4 monitor and 2 manage
C. 2 monitor and 3 manage
D. 5 monitor and 1 manage

Answer: D

Question 2.
What is the maximum affordable amount of business data loss?

A. Risk Tlerance Limit
B. Recovery point objective
C. Critical mass of information
D. Business continuity threshold

Answer: B

Question 3.
You are installing an MSA2012i array. The customer asks about the data protection features of the new array. Which capabilities does it have?

A. 64 snapshots and 64 volume copies
B. 64 snapshots and 128 volume copies
C. 128 snapshots and 64 volume copies
D. 128 snapshots and 128 volume copies

Answer: B

Question 4.
Click the Exhibit button.

Which functions does a Network Storage Router (NSR) provide?
Exhibit:
 

A. Fibre Channel-to-SCSI bridge
B. Data encryption to the tape device
C. Backup accelerator for 2Gb SANs
D. Two-stage backup capabilities for SAN environments

Answer: A

Question 5.
Which components can be managed through the management software of the MSA2000 family? (Select Two)

A. Vdisk
B. Disk Group
C. Data Replication
D. Snap pool

Answer: A, D

Question 6.
What is a volume copy?

A. A full copy of target data
B. Backup copy of source data
C. A full allocation copy of all volume source data
D. Full copy of all configured volumes

Answer: C

Question 7.
Which type of software is the HP StorageWorks MSA Storage Management Utility?

A. Target based web application
B. Serial based web application
C. Java based secure management
D. Windows based remote connectivity

Answer: A

Question 8.
What does MPIO do if the Device Specific Module (DSM) returns an inactive path?

A. Initiates a path failover
B. Performs automatic path verification
C. Removes the path from the load balancing policy
D. Changes the storage LUN to write-through mode

Answer: A

Question 9.
What is the maximum acceptable time interval for business data unavailability?

A. Installation of backup procedure
B. Recovery point objective
C. Half an hour down time
D. During off times maximum 30 minutes

Answer: B

Question 10.
Which component enables access to block storage on a Fiber Channel SAN across an Ethernet network?

A. Ethernet Switch
B. Fibre Channel Switch
C. FC-IP gateway connector
D. iSCSI to Fiber Channel bridge

Answer: D


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.