|
Question 1. In Select Identity, an entitlement is . A. an abstraction of the resource privileges granted to an identity B. an abstraction that organizes privileges and permissions, and controls authorization C. a Select Identity concept that defines a logical grouping of users that can access a service D. a Select Identity abstraction that defines how a logical grouping of users will access a Select Identity service E. a name-value pair that can be created or changed at runtime in a workflow instance through actions, a workflow API call, or returned by an application invocation Answer: A Question 2. Which four design patterns does Select Identity leverage that promote adaptability, modularity, extension and reuse? (Choose four.) A. dynamic user grouping B. n-tier administration delegation C. resource-centric user provisioning D. services-based resource abstraction E. fixed, variable and rule-based entitlement assignment F. role-based access control (RBAC) entitlement assignment Answer: A, B, D, E Question 3. Which process should be used to load existing user accounts from a resource into Select Identity? A. bulk add B. bulk move C. reconciliation D. auto-discovery Answer: D Question 4. Which performance optimization is most likely to improve the speed of user lookups from Select Access at the time of authentication? A. use SSL between the Validators and the directory server B. use a directory server that is also a Windows domain controller C. configure the Validator to failover from one directory server to another D. index the most frequently-searched user attributes in the directory server Answer: D Question 5. Which four statements are true about Select Access setup? (Choose four.) A. The setup program contains a repair facility to restore initial setup. B. The setup program can be run centrally to install Web Server Enforcers. C. The Select Access setup tool de-registers components that are being uninstalled. D. The setup program should generally be run on every server that will host a Select Access component. E. The Select Access setup program should only be run with UNIX root or Windows Administrator privilege. F. A Java runtime environment should be installed before using the setup program to install an Audit Server. Answer: A, C, D, E Question 6. What are three competitive advantages of the Open View Identity Management solution? (Choose three.) A. modularity - manage discretely or collectively B. simplification - ease of use/ease of integration C. centralized control - manage all network devices D. automated updates - push software updates to affected systems E. open architecture - standards-based components and processes Answer: A, B, E Question 7. Which type (s) of services can be created in Select Identity? A. business service only B. consumer service only C. composite service only D. business service and composite service E. composite service and consumer service Answer: D Question 8. When performing a user search with no search criteria specified in Select Identity, it takes more than 30 seconds to return. Assuming that 100000 users have already been loaded into the system, what is the most likely source of the degradation in performance? A. database B. load balancer C. network latency D. application server Answer: A Question 9. Your client needs to create a new attribute called Employee Type, which can only be populated with one of five possible values. Which type of function should you use to meet this requirement? A. value validation function B. value limitation function C. value constraint function D. value generation function E. value verification function Answer: C Question 10. Which two statements are true about the Select Access Rule Builder? (Choose two.) A. It is possible to add new types of authentication servers using the Rule Builder. B. Both access policy rules as well as workflow rules can be created using the Rule Builder. C. The Rule Builder is a graphical interface that allows creation of conditional access rules. D. The Rule Builder requires administrators to input rules by typing them in a specific syntax with Boolean operators such as AND OR. Answer: B, C Question 11. Company A wants to allow administrators of Company B to add Company B employees to the Select Access user repository of Company A. No other administration capability needs to be delegated. Which two actions achieve this result? (Choose two.) A. allow Company B administrators to use the HTML forms-based administration interface only B. allow Company B administrators to use the HTML forms-based administration interface but only for access policy management C. allow Company B administrators to use the main Select Access administrator's applet and restrict their capability to user administration only D. allow Company B administrators to use the applet-based administration Policy Builder interface only and restrict the capability to user administration only Answer: A, D Question 12. What are two methods of discovering Web pages as Select Access resources? (Choose two.) A. launch a scan of the HTTP Web pages from the Policy Builder B. use a Validator plug-in to obtain the list of Web pages and store it directly in the LDAP directory server C. configure the Enforcer on the Web server to push the list of Web pages to the Policy Builder via the Validator D. import the list of Web pages into the Policy Builder from a text file containing URLs separated by carriage returns Answer: A, D Question 13. Which parameter of the Select Access Validator configuration should you alter to increase the frequency at which stale cache items are deleted from the Validator's cache? A. client idle timeout B. cache refresh interval C. cache cleanup interval D. maximum cache lifetime E. cache cleanup percentage Answer: C Question 14. Which three parameters can be configured in Select Identity's TruAccess.properties file? (Choose three.) A. the maximum number of retry attempts for sending e-mail B. the database type used as the Select Identity data repository C. the error message an administrator receives if an e-mail cannot be delivered D. the time interval that the e-mail daemon uses for sending new e-mail if the initial attempt is unsuccessful Answer: A, B, D Question 15. Which statement is true about Select Access? A. There can be no load balancing between Enforcers and Validators as only failover is possible. B. Enforcers can failover and load balance between Validators, but the default configuration does not include this. C. Enforcers, by default, failover as well as balance load between all available Validators using the round robin method. D. For failover and load balancing to work between the Enforcers and Validators, an external network load balancer must be used. Answer: C Question 16. Which format is used by the initial user load process in Select Identity? A. EDI B. XML C. LDIF D. SPML E. SNMP Answer: D Question 17. The Select Access query tool can be easily used to test which three aspects of performance? (Choose three.) A. Validator load B. stress testing C. application response time D. Select Access internal communication Answer: A, B, D
|
Question 1 A Linux technician would like to change the default lpr queue to print to a new printer. Which file should be edited to make this change? A. /etc/printers/default.conf B. /etc/vprint C. /etc/printcap D. /etc/lpd.conf Answer: C Question 2 Which of the following commands lists the file systems available for the NFS (Network File System) server upiter? A. showmount e jupiter B. ls -l jupiter C. showmount -e jupiter D. ls jupiter Answer: C Question 3 The man page for the is command states: The full documentation for ls is maintained as a Texinfo manual. Which of the following commands will retrieve the full documentation for the ls command? A. man -info ls B. info ls C. infoman ls D. text ls Answer: B Question 4 A DHCP server has been added to the network. The local system has been reconfigured to connect using DHCP. How could an administrator restart network services and test that the interface and the DHCP server are functioning properly? A. /bin/netstat -R; ping comptia.org B. /usr/bin/network restart; ping comptia.org C. /sbin/route restart; ifconfig lo D. /etc/init.d/network restart; ifconfig eth0 Answer: D Question 5 Which of the following files contains a list of file systems that can be currently mounted on the system if all supported modules have been loaded? A. /etc/filesystems B. /var/filesystems C. /dev/filesystems D. /proc/filesystems Answer: D Question 6 A user is unable to access the Internet from their Client. The client's TCP/IP settings are 192.168.1.87/26. The default gateway's IP address is 192.168.1.1. What command must be entered on the client machine to enable communications to the Internet? A. ifconfig eth0 up 192.168.1.87 netmask 255.255.255.128 B. ifconfig eth0 up 192.168.1.1 netmask 255.255.255.0 C. ifconfig eth0 up 192.168.1.87 netmask 255.255.255.192 broadcast 192.168.1.255 D. ifconfig eth0 up 192.168.1.87 netmask 255.255.255.255 Answer: A Question 7 Which of the following services commonly uses Port 22? A. SMTP B. DNS C. FTP D. SSH (Secure Shell) Answer: D Question 8 A newly created user, john, reports that he has access to the file ?var/mail/joe? but should not have this access. Which of the following MOST likely caused this? A. User john was created with the same UID (User ID) as the removed user named joe. B. User john and joe are sharing a home directory. C. User john is forwarding all of his mail to joe. D. User joe's email is still cached by the system although his UID (User ID) has been removed. Answer: A Question 9 Which of the following can be used to determine who has scheduled a job? A. at -d B. at -l C. who D. whodo Answer: B Question 10 Which of the following commands is used to search the whole directory structure to locate a specific file, but still can execute other commands while the 'find' command is searching for the file? A. find filename > background B. find / -name filename & C. find / -name filename D. find / filename & Answer: B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.