|
Question 1. Which three utilities can be used to prepare for and create the central store? (Choose three.) A. CTXDOMAINPREP B. CTXSCHEMAPREP C. CTXSERVERPREP D. CTXFILESYNCPREP E. CTXFILESYNCCLEAN Answer: A, B, D Question 2. Scenario: The agent has just been installed. When the agent starts, the following error message is displayed: Meta Frame Password Manager agent is unable to retrieve the License server location. Check to see if agent can connect to synchronization point. Agent is disabled. Which action must you take to resolve this situation? A. Open the Password Manager console and create a user configuration with the correct License server for the affected user. B. Open the License Management console and create a user configuration with the correct License server for the affected user. C. Open a command prompt on the affected machine and use the ping command to verify that the agent can reach the License server. D. Open a command prompt on the affected machine and use the NSLOOKUP command to verify that the agent can resolve the hostname of the License server. Answer: A Question 3. Which information is used as the basis for the credential encryption keys? A. Client names B. License types C. Windows logon credentials D. Application credential information Answer: C Question 4. When configuring a web application that requires advanced matching to distinguish between web frames, which three criteria can be specified? (Choose three.) A. Text B. Rows C. HTML D. Attribute E. Columns Answer: A, C, D Question 5. Scenario: You are the administrator of a network that includes an implementation of Citrix Password Manager 4.0. You are planning to rebuild the server hosting the NTFS Shared Folder central store. You already copied your NTFS Shared Folder central store data to a new server. Currently the Password Manager agents are still using the central store on the old server. Currently the Password Manager agent is distributed through a Group Policy Object (GPO) in Active Directory at the domain level. Which sequence of actions is the easiest way to configure the agents to point to the new central store? A. Create a new Password Manager agent 4.0 administrative installation package that points to the old central store location; Create a new GPO to deploy this package at the domain level; Delete the old GPO that points to the old central store; In the console, configure all users to be redirected to the new central store. B. Create a new Password Manager agent 4.0 administrative installation package that points to the new central store location; Create a new GPO to deploy this package at the domain level; Delete the old GPO that points to the old central store; In the console, configure all users to be redirected to the old central store. C. Create a Password Manager agent 4.0 administrative installation package that points to the old central store location; Edit the existing GPO and delete the existing agent package; Add the new agent package to this GPO; Redeploy this package to all users; In the console, configure all users to be redirected to the new central store. D. Create a Password Manager agent 4.0 administrative installation package that points to the new central store location; Edit the existing GPO and delete the existing agent package; Add the new agent package to this GPO; Redeploy this package to all users; In the console, configure all users to be redirected to the new central store Answer: D Question 6. Where is the disconnected mode period for the licensing model configured? A. In the User Configuration node of the Password Manager Console B. In the User Configuration tab of the License Management Console C. In the Licensing Provisioning node of the Password Manager Console D. In the Licensing Provisioning tab of the License Management Console Answer: A Question 7. When using the Password Manager Service Configuration Tool, what is the purpose of the user account with rights and privileges specific to data proxy? A. It resets user passwords. B. It connects to the data proxy. C. It hosts the Citrix XTE Service. D. It reads and writes data to the central store. Answer: D Question 8. The Password Manager console user configuration wizard provides the ability to assign _____ and _____ to the users. (Fill in the blanks with the two correct options). A. password policies B. application definitions C. identity verification questions D. multiple question authentication Answer: A, B Question 9. If you wish to enable data integrity on a central store that has pre-existing data that has never been signed, you must _____ before you _____. (Fill in the blanks with the correct pair of options.) A. enable data integrity on the console; sign the data with the signing tool B. sign the data with the signing tool; enable data integrity on the console C. disable data integrity on the console; unsign the data with the signing tool D. unsign the data with the signing tool; enable data integrity on the console Answer: B Question 10. When configuring a host application, how can the administrator configure the definition to submit an "Enter" before submitting credentials to the host? A. Type "@E" into the "Keys before" setting in the console B. Type "Enter" into the "Keys before" setting in the console C. Enable the "Use ENTER instead of TAB to move between fields on this form" setting in the console D. Disable the "Use ENTER instead of TAB to move between fields on this form" setting in the console Answer: A Question 11. Which three tasks need to be completed to enable self-service password reset in an existing Password Manager deployment? (Choose three.) A. Enable multiple question authentications B. Enable self-service password reset in Logon Manager C. Enable the self-service password reset feature license D. Enable self-service password reset for each user configuration E. Redeploy the agent software with the self-service password reset feature enabled Answer: A, D, E Question 12. Which three components are required on the server running Password Manager for a successful implementation of the smart card software? (Choose three.) A. PC/SC software B. Citrix Presentation Server C. Microsoft Active Directory D. Smart card reader software drivers E. Cryptographic Service Provider software Answer: A, D, E Question 13. If multiple Password Manager administrators are using the console simultaneously, how does Password Manager ensure that changes are not lost? A. Password Manager restricts access to nodes already in use by other administrators. B. Password Manager console dynamically updates data as it changes. Administrators see the changes in real time. C. Password Manager uses an internal algorithm for conflict resolution. No further intervention is required by administrators. D. Password Manager generates a warning at save time if changes have occurred since the console was opened. Administrators are required to run discovery before saving. Answer: D Question 14. Scenario: A user who logs on to two different workstations throughout the day reports that changes made to each of the workstations are not synchronized right away. You are required to resolve the user's problem and minimize the impact on network bandwidth. Which user configuration setting would meet this requirement? A. Disable the "Time between automatic synchronization requests" B. Enable the "Time between automatic synchronization requests" and set the "Minutes" value to 1 C. Enable the "Synchronize every time the users launch recognized applications or Logon Manager" D. Disable the "Synchronize every time the users launch recognized applications or Logon Manager" Answer: C Question 15. Scenario: In an organization, 15 laptops are used by the remote workforce for field work. Password Manager is installed and named user licensing is implemented on the laptops. One laptop is lost and its named user license is checked out. What must be done to reclaim this license? A. Restart the license server. B. Wait until the disconnected mode expires and the license will be checked in automatically. C. Use the License Management Console license returns function and select the hostname of the affected computer. D. Use the LMCONFIG -r command on the License server and provide the hostname of the affected computer as a parameter on the command line. Answer: B
|
Question 1. You are creating a database in your RAC implementation You are using the DBCA to create the database and you selected the Raw Devices mapping file on one of the screens of the DBCA. What is the reason for selecting this file? A. You want the DBCA to bind the partitions to raw devices B. You want to configure an ASM diskgroup containing raw devices C. You want to set the appropriate raw partition for each database file D. You want to provide the DBCA with a list of all the storage devices that are currently bound to a raw interface Answer: C Question 2. To complete a cluster database creation, the DBA must choose the cluster database storage method. Which storage choice is not correct? ( Choose the incorrect one.) A. Cluster File System B. Raw Devices C. Standard UNIX File System D. Automatic Storage Management (ASM) E. Supported SAN/NAS storage Answer: C Question 3. Which statement is true? A. You must use RMAN to migrate your tempfiles to ASM storage B. You must use RMAN to migrate your flashback log files to ASM storage C. You must use RMAN to migrate your data files to ASM storage D. You must use RMAN to migrate your change-tracking file to ASM storage E. You can migrate your entire database to ASM storage without shutting down your database F. You must use RMAN to migrate your online redo log files to ASM storage Answer: C Question 4. In which directory should you put your callout scripts on your RAC nodes? A. $ORACLE_HOME/opmn/conf/ B. $ORA_CRS_HOME/racg/usrco/ C. $ORA_CRS_HOME/opmn/conf/ D. $ORACLE_HOME/racg/usrco/ Answer: B Question 5. Your four-node RAC cluster is no longer coping with workloads for one of its databases at peak periods and you decide to add another node to the cluster. The current configuration has two RAC databases, each with four instances with only the second database using ASM as a clustered database file system. ASM is installed in a separate home. Which five steps must you take to add all the software components and processes to the new node before you run DBCA to add database and ASM instances on the new cluster nodes. Do not be concerned with the correct sequence for the steps. (Choose Five.) A. Run cluvfy stage-pre crsinstfrom one of the existing nodes to verify the cluster configuration B. Run addNode.sh in the ASM home/oui/bin directory from one of the existing nodes C. Run racgons add_config from one o the existing nodes to add the ONS metadata to the OCR D. Run addnode.sh in the Clusterware home/oui/bin directory form one of the existing nodes to define the new node to all existing nodes E. Run netca from the new node to add a listener to the new node F. Run addnode.sh in the Clusterware home/oui/bin directory from each of the existing nodes once to define the new node to each existing node G. Run addNode.sh in the RDBMS home/oui/bin directory from one of the existing nodes Answer: B, C, D, E, G Question 6. Which two statements are true in a RAC environment? (Choose two.) A. After you create a service using Database Configuration Assistance (DBCA), you need to start it with a separate command B. After you create a service, you need to enable it for CRS to manage it C. After you create a service using SRVCTL, you need to start it with a separate command D. When suing SRVCTL to create a service, you do not need to add corresponding TNS entry in your tnsnames.ora E. When using DBCA to create service, you do not need to add the corresponding TNS entry in your tnsnames.ora on the cluster nodes Answer: C, E Question 7. You need to add a new service to your RAC database, called DBA to account for all the work done by database administrator sessions performing routing maintenance , to make this visible in the v$service_stats view. The maintenance would be done at quieter times but restricted session is not an option due to round-the-clock access requirements. The database administrator team may connect locally or remotely to the RAC database. You decide to use DBCA to create the new service. What must be true to allow client-server connection to the DBA service? (Choose two.) A. The service must have at least one preferred or available instance that is running and accepting logins B. The TNSNAMES.ORA file or a name server must contain the net service entries for the DBA service C. All the listeners must be reloaded using LSNRCTL RELOAD to recongnize the dynamically created service D. The ALTER SYSTEM REGISTER command must be used to include PMON to register the service with the listeners E. The services must be started using the SRVCTL START SERVICE command F. The service must be started using the DBMS_SERVICE.START_SERVICE procedure Answer: A, B Question 8. You are asked to investigate a problem regarding client connectivity between the HR service and a database, which is on a four-node RAC cluster. The HR service has four preferred instances on the RAC cluster. This cluster also supports five other services. Occasionally, a client-connect request for the HR service takes several minutes to connect, whereas the other five services connect within a second or two. Client-side and server-side connection load balancing are used for all the services. Which combination of network settings would explain these symptoms? (Choose two.) A. The TNSNAMES.ORA file has an entry for the HR service that uses only the most host name for the public IP Address and all the listeners listen on both the Public and Virtual IP addresses B. The listener on one or more nodes is listening on both the Public IP Address and the Virtual IP Address and HR TNSNAMES entry uses the Virtual IP Address C. The TNSNAMES.ORA file has an entry for the five other services that use the hostnames for the Virtual IP Addresses and all the listeners listen on both the Public and Virtual IP Addresses D. The TNSNAMES.ORA file has an entry for all six services that uses the host name for the Public IP address and not the Virtual IP Address E. The listener on one or more nodes is listening only on the virtual IP address and the HR TNSNAME entry uses the hostnames for the virtual IP addresses Answer: A, C Question 9. Exhibit: Your work as a DBA at ITCertKeys.com. You study the exhibit carefully. You are tasked to help a colleague to logically remove node NLDEDUC2 from a RAC cluster installation. On observing the colleague's terminal, you notice the output as seen in the exhibit. Based on this, which five additional steps would you recommend? Do not be concerned with the correct sequence for the steps. (Choose Five.) A. Check that the software has been removed from the database and ASM homes on NLEDUC2 B. Stop and restart the clusterware on NLEDUC1 C. Check that the node has been removed from the database and ASM inventories D. Check that the ONS configuration has been updated on the remaining node E. Remove the listener from NLEDUC2 F. Check that the database and ASM instances are all terminated on NLEDUC2 G. Remove the node from the clusterware H. Stop and restart the nodeapps on NLEDUC1 Answer: A, C, D, F, G Question 10. Which parameter file should you use to configure the Oracle notification server on your RAC nodes? A. $ORA_CRS_HOME/opmn/conf/ons.config B. $ORACLE_HOME/opmn/conf/ons.config C. $ORACLE_HOME/racg/usrco/ons.config D. $ORA_CRS_HOME/racg/usrco/ons.config Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.