|
Question 1.
Which two statements are true about the MetaFrame Password Manager License Administration tool? (Choose Tow).
A. This tool is dependent on the console.
B. This tool can be used to specify the location of the license repository.
C. If multiple consoles exist, this tool is only available on one console.
D. Multiple instance of this tool should not be run at the same time.
Answer: B, D
Question 2.
What must be done in order to use an Active Directory container as the license repository?
A. The schema must be extended.
B. The type of license to be used must be determined.
C. License numbers must be added to the License Administration tool.
D. Licenses must be activated using the Citrix Activation system.
Answer: A
Question 3.
To ensure that synchronization occurs correctly, when using a shared folder as the central credential store, what is required?
A. SyncManager settings need to be configured and deployed.
B. The account used to connect to the share required full control to the shared drive.
C. The CTXDOMAINPREP.VBS script should be run to prepare the domain for credential
synchronization.
D. The administrative account for the system that hosts the console should be used to
authenticate to the share.
Answer: A
Question 4.
Which Windows 2000 registry key needs to have its DWORD value set to I in order to allow the administrator to extend the schema?
A. Update Schema
B. Allow Update Schema
C. Schema Update
D. Allow Schema Extension Update
Answer: C
Question 5.
Which utility would the domain administrator use to provide all users in the domain with the permissions needed to create, modify, and delete their SSO objects?
A. CTXUSERPREP.EXE
B. CTXDOMAINPREP.EXE
C. CTXFILESYNCPREP.EXE
D. escript CTXSCHEMAPREP.VBS
Answer: B
Question 6.
What are three requirements for using a shared folder as the central credential store?
(Choose three)
A. Administrators must have full control permissions to the share.
B. All users must have full control permissions to he share.
C. The shared folder needs to be a UNC path with Windows NT file support.
D. The CTXFILESYNCPREP.EXE utility should be run on the system hosting the share.
E. The system hosting the shared folder should be in the same domain as the agents that it will
synchronize
Answer: C, D, E
Question 7.
Which statement about the agent setting SyncInterval is true?
A. SyncInerval can be defined by a user in the agent.
B. Synchronization is dependent on a user-generated event.
C. SynchInterval it sets the interval (in minutes) between automatic resynchronization
Answer: D
Question 8.
Which agent setting in the console sets the number of domain levels used as the matching criteria?
A. Auto Login
B. Default Policy
C. DNLevelsToMatch
D. Logon Manager Columns
Answer: C
Question 9.
What are two reasons for using password sharing groups? (Choose two)
A. to simplify password policy delivery
B. to avoid the need for using complex policies
C. to group applications that share backend authentication
D. to group applications regardless of backend authentication
Answer: A, C
Question 10.
Which of the following types of characters support an exclusion list?
A. uppercase letters
B. lowercase letters
C. special characters
D. numeric characters
Answer: C
Question 11.
Which statement describes a pure MetaFrame XP Presentation Server deployment
A. The MetaFrame Password Agent is installed only on the client devices
B. The MetaFrame Password Console is installed only on the client devices
C. The MetaFrame Password Agent is installed only on the MetaFrame XP Presentation Servers.
D. The MetaFrame Password Console is installed only on the MetaFrame XP Presentation
Servers.
Answer: C
Question 12.
An organization's network consists of MetaFrame XP Presentation Servers to deploy application. MetaFrame Secure Access Manager is used to access web and published applications. User workstations are running Windows 2000 Professional and Windows XP Professional. All computers are in an Active Directory domain. The organization has three geographic regions: A headquarters in the US, a regional office in Europe, and an office in the Asia Pacific Users are located in all three regions and server farms exist in all three regions. Users are permitted to access application from all MetaFrame XP Presentation Servers regardless of location. Mandatory profiles will be used for all applications deployed by MetaFrame XP Presentation Server. Configurations: MetaFrame Password Manager Agent is installed on eh MetaFrame XP Presentation Servers and user workstations. Active Directory synchronization is setup. Which two results will be configuration have on the environment described above? (Choose two)
A. Users will have single sign on enabled to access all MetaFrame Secure Access Manager web
applications
B. Users will have single sign on enabled to access all MetaFrame XP Presentation Server
deployed applications in their region only.
C. Users who access MetaFrame XP Presentation Servers in all regions regardless of the user's
location will have single sign on enabled.
D. Users will have single sign on access to MetaFrame deployed applications only.
Answer: A, C
Question 13.
An administrator will implement MetaFrame Password Manager to provide SSO for users who access published applications using web interface for MetaFrame XP Presentation Server. Users currently access applications through a browser using an ICA client. Remote connections are secured through the use of secure gateway for MetaFrame XP Presentation Server. In which location should the agent be installed for this deployment scenario?
A. On the server running the Secure Gateway service
B. On the web interface for MetaFrame XP web server
C. On each MetaFrame XP Presentation Server in the farm
D. On the system with the Secure Ticketing Authority installed
Answer: C
Question 14.
What are two ways to configure Retry Timeout settings? (Choose two)
A. Manually
B. Per application
C. By application type
D. Per defined application
Answer: B, C
Question 15.
Which three can be used to create an application definition? (Choose three)
A. Templates
B. APPLIST.INI
C. Access Manager
D. Manual configuration
E. Add Application Wizard
Answer: A, D, E
Question 16.
How are NET applications configured in the MetaFrame Password Manager Console?
A. as host applications
B. as Web applications
C. as NET applications
D. as Windows applications
Answer: D
Question 17.
What is the browser requirement for the Web Browser SSO Helper Object?
A. Internet Explorer 5.5
B. Netscape Navigator 7.1
C. Internet Explorer 6.0 SP2
D. Netscape Communicator 4.8
Answer: C
Question 18.
An administrator has designated the global error detection settings for Windows applications as the following.
Logon Timeout (sec): 90
Max Retries: 2
Hide. Confirm Password. Default
Mask password. eyes
Required result:
The finance department has business critical Windows applications for which you would like to limit the Logon
Timeout to 30 seconds and have the Max Retries set to one or (I)
Desired Result:
All other Windows applications should retain the administrator configured settings listed above. Which configuration would give the administrator the desired and required result?
A. Select the default setting at the application-level error detection for all applications.
B. Alter the global error detection settings for applications to accept the default settings for all
error detection.
C. Change the global error detection settings for applications to accept the default for Logon
Timeout and Max Retries.
D. Specify that the application-level error detection setting for the finance applications have
Logon Timeout set at 30 and Max Retries set at one or 1.
Answer: D
Question 19.
You have a system that has Windows 2000 Server installed. Which additional software is required before installing MetaFrame Password Manager Console?
A. Java Virtual Machine
B. Microsoft SQL Server
C. Microsoft NET Framework I.I
D. MetaFrame XP Presentation Server
Answer: C
Question 20.
Which two conditions must exist to use mandatory profiles with a MetaFrame Password Manager implementation? (Choose two)
A. The registry must be edited.
B. NTFS partitions must be configured.
C. Files must be stored in the Application Data folder.
D. The Application Data folder must be placed into a writable location.
E. Folder redirection must be implemented for the Application Data folder.
Answer: D, E
Question 21.
Which condition must exist for users to be able to view passwords of the applications listed in the Logon Manager?
A. The end-user must enable this during setup.
B. The Auto-Prompt feature must be enabled by a user.
C. The application must be a pre-defined application by a user.
D. The Reveal feature must be enabled through the console by an administrator.
Answer: D
Question 22.
Which statement is true about a default agent installation?
A. Users create the list of pre-defined applications found in the Logon Manager.
B. Users can add new applications to the list in the Logon Manager.
C. Users can add applications that require user ID, password, and domain to the Logon Manager.
D. Users can only use MetaFrame Password Manager with the pre-defined applications listed in
Logon Manager.
Answer: B
Question 23.
Which configuration file initially contains the information needed for the Intelligent Agent Response component to identify and respond to password change events?
A. AELIST.INI
B. FTULIST.INI
C. APPLIST.INI
D. ENTLIST.INI
Answer: D
Question 24.
Which generates the primary authentication key?
A. Crypto API
B. Encryptor API
C. Authenticator API
D. Cryptographix service
Answer: A
Question 25.
If multiple administrators are making changes to the synchronization point, how can administrators make sure that no changes to the console settings are lost?.
A. They can create a customized MSI file.
B. Only one administrator can connect to the synchronization point at a time.
C. They can save the console. XML file in a location accessible to all administrators.
D. They can export the agent settings asa REG file and then import it into another console.
Answer: C
Question 26.
How is data merged between the local credential store and the central credential store?
A. By UID
B. By session ID.
C. By date and time.
D. By validation ticket.
Answer: C
Question 27.
What are the three layers of authentication? (choose Three).
A. Authenticator.
B. Authenticator API
C. Authenticator Event.
D. Authenticator Storage.
E. Authenticator Services.
Answer: A, B, E
|
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.