|
thanks
|
Question 1. Which setting must be defined in the user configuration to allow users to associate accounts in different domains? A. Provide default domain B. Provide default service address C. Allow users to associate accounts D. Allow users to edit service address Answer: C Question 2. The signing tool uses the _____ to sign the data on the central data store and the _____ to verify the data on the central data store. (Fill in the blanks with the correct pair of options.) A. Public Key; SSL Certificate B. SSL Certificate; Private Key C. PRIVATEKEYCERT.CERT; PUBLICKEYCERT.CERT D. PUBLICKEYCERT.CERT; PRIVATEKEYCERT.CERT Answer: C Question 3. An administrator is configuring the Password Manager Service and enters information for the account to be used for data proxy communication with the service. What is the purpose of having a user account with rights and privileges specific to data store proxy? A. To reset users passwords B. To connect to the data proxy C. To read and write data to the central store D. To host the self-service password reset web service Answer: C Question 4. Which three settings are available for smart card encryption when smart cards are used with Password Manager? (Choose three.) A. Smart Card Certificate B. Allow Smart Card PINs C. Enable Kerberos Ticket Support D. Enable Public Key Infrastructure E. Microsoft Data Protection API (requires roaming profiles) Answer: A, B, E Question 5. Scenario: An administrator deploys Hot Desktop in an environment where users log in with smart cards. The selected smart card key source is Microsoft Data Protection API. The help desk receives numerous calls from users reporting that they are locked out of their systems. Which two key recovery options are available to unlock the users' accounts? (Choose two.) A. Automatic key recovery B. Self-service password unlock C. Question-based authentication D. Prompt users to enter their previous password Answer: A, C Question 6. Where should the Password Manager agent software be installed? A. On any server in the environment B. On the same computer as the Service C. On any client device in the environment D. On the same computer where the enabled single sign-on applications run Answer: D Question 7. Scenario: An application group consists of six applications, two of which have the same password. The administrator wants to ensure that when a user changes the password to one of the two applications in the application group with the same password, the change is transferred to the other application. Which two steps must an administrator perform in order to meet the requirements of this scenario? (Choose two.) A. Make the application group a password sharing group. B. Apply the domain password policy to the application group. C. Enable initial credential setup for the two applications with the same password. D. Create a second application group which only includes the two applications with the same password. Answer: A, D Question 8. Which user account needs rights and privileges to manage passwords for every user in the domain? A. Data proxy B. Self-Service C. XTE Service D. Citrix Presentation Server Answer: B Question 9. What are two justifications for using an NTFS shared folder as the central store in an environment that has Active Directory implemented? (Choose two.) A. Users require different agent settings. B. A large number of users exist in the environment. C. Administrators do not need to extend the Active Directory schema. D. This helps reduce the authentication task workload from the Active Directory environment. Answer: C, D Question 10. Scenario: An administrator creates a user configuration and assigns an application to the user configuration. The administrator then logs in as a user but does not see the application available in Logon Manager. What is a possible cause of this behavior? A. The administrator specified an invalid license server. B. The administrator has disabled client-side application detection. C. The administrator did not install the application on the user's workstation. D. The administrator used a user account that was not assigned to the user configuration. Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.