|
Question 1. On which three back-end authentication servers can you use the "userAttr" attribute? (Choose three.) A. certificate server B. NIS server C. RADIUS D. SiteMinder E. LDAP Answer: C, D, E Question 2. You have just finished creating an IVS on your device. You can log in to your IVS but you cannot access any backend resources. What should you troubleshoot first? A. Verify that you have associated your IVS to the correct VLAN. B. Verify that you have allocated enough users for your IVS. C. Verify that you are not blocked because of an untrusted certificate on the IVS. D. Verify that you have associated your IVS to the correct virtual IP. Answer: A Question 3. Which two network settings are accessible only through the root administrator and cannot be accessed by the VS administrator? (Choose two.) A. internal port IP address B. Network Connect filters C. DNS options D. hosts file Answer: A, B Question 4. Which operation would you use to extract the configuration in a format that can be read by a script? A. XML export B. Syslog capture C. Config export D. SNMPv3 trap Answer: A Question 5. When using Secure Virtual Workspace, where is the protected workspace created? A. in the IVE memory B. on the IVE hard drive C. on a trusted server D. on the client desktop Answer: D Question 6. In which format is the client-side log stored on the client? A. XML B. binary C. ASCII D. base64 Answer: C Question 7. You have just created a secure Web portal that will be accessed through the IVE device. Which two steps must you complete before creating the bookmark for accessing this portal? (Choose two.) A. Generate a trusted certificate for your IVE device. B. Verify that the IVE device has a trusted relationship with your Certificate Authority. C. Verify that "Allow browsing untrusted SSL websites" is selected in the "Web Options" role. D. Generate a certificate for the secure Web portal from your trusted Certificate Authority. Answer: B, D Question 8. You have correctly enabled meeting email notifications by defining the appropriate SMTP options on the IVE device's Secure Meeting configuration page. However, when new meetings are created, invitees do not receive the emails. What might be causing this problem? A. You have not specified the IVE device's fully qualified hostname on the Network configuration page. B. The time is not synchronized between the IVE device and the SMTP server. C. You have chosen to "Hide attendee names" when specifying meeting options. D. You have invited attendees with email addresses in a domain that is not registered on the Secure Meeting configuration page. Answer: A Question 9. Which three client endpoint agents can produce and auto-upload logs when configured to do so? (Choose three.) A. Meetings B. Installer Service C. Terminal Services D. Advanced Endpoint Defense E. Host Checker Answer: A, C, E Question 10. A company does not want to allow users to remotely download content through the IVE rewriter because of concerns that the content will be left behind on user PCs. Which three options should be investigated and used to help mitigate this risk? (Choose three.) A. Disable caching for all Web content. B. Use Secure Virtual Workspace. C. Use Cache Cleaner. D. Enable caching for all Web content. E. Enable caching in the Web browser. Answer: A, B, C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.