|
Question 1. In Select Identity, an entitlement is . A. an abstraction of the resource privileges granted to an identity B. an abstraction that organizes privileges and permissions, and controls authorization C. a Select Identity concept that defines a logical grouping of users that can access a service D. a Select Identity abstraction that defines how a logical grouping of users will access a Select Identity service E. a name-value pair that can be created or changed at runtime in a workflow instance through actions, a workflow API call, or returned by an application invocation Answer: A Question 2. Which four design patterns does Select Identity leverage that promote adaptability, modularity, extension and reuse? (Choose four.) A. dynamic user grouping B. n-tier administration delegation C. resource-centric user provisioning D. services-based resource abstraction E. fixed, variable and rule-based entitlement assignment F. role-based access control (RBAC) entitlement assignment Answer: A, B, D, E Question 3. Which process should be used to load existing user accounts from a resource into Select Identity? A. bulk add B. bulk move C. reconciliation D. auto-discovery Answer: D Question 4. Which performance optimization is most likely to improve the speed of user lookups from Select Access at the time of authentication? A. use SSL between the Validators and the directory server B. use a directory server that is also a Windows domain controller C. configure the Validator to failover from one directory server to another D. index the most frequently-searched user attributes in the directory server Answer: D Question 5. Which four statements are true about Select Access setup? (Choose four.) A. The setup program contains a repair facility to restore initial setup. B. The setup program can be run centrally to install Web Server Enforcers. C. The Select Access setup tool de-registers components that are being uninstalled. D. The setup program should generally be run on every server that will host a Select Access component. E. The Select Access setup program should only be run with UNIX root or Windows Administrator privilege. F. A Java runtime environment should be installed before using the setup program to install an Audit Server. Answer: A, C, D, E Question 6. What are three competitive advantages of the Open View Identity Management solution? (Choose three.) A. modularity - manage discretely or collectively B. simplification - ease of use/ease of integration C. centralized control - manage all network devices D. automated updates - push software updates to affected systems E. open architecture - standards-based components and processes Answer: A, B, E Question 7. Which type (s) of services can be created in Select Identity? A. business service only B. consumer service only C. composite service only D. business service and composite service E. composite service and consumer service Answer: D Question 8. When performing a user search with no search criteria specified in Select Identity, it takes more than 30 seconds to return. Assuming that 100000 users have already been loaded into the system, what is the most likely source of the degradation in performance? A. database B. load balancer C. network latency D. application server Answer: A Question 9. Your client needs to create a new attribute called Employee Type, which can only be populated with one of five possible values. Which type of function should you use to meet this requirement? A. value validation function B. value limitation function C. value constraint function D. value generation function E. value verification function Answer: C Question 10. Which two statements are true about the Select Access Rule Builder? (Choose two.) A. It is possible to add new types of authentication servers using the Rule Builder. B. Both access policy rules as well as workflow rules can be created using the Rule Builder. C. The Rule Builder is a graphical interface that allows creation of conditional access rules. D. The Rule Builder requires administrators to input rules by typing them in a specific syntax with Boolean operators such as AND OR. Answer: B, C Question 11. Company A wants to allow administrators of Company B to add Company B employees to the Select Access user repository of Company A. No other administration capability needs to be delegated. Which two actions achieve this result? (Choose two.) A. allow Company B administrators to use the HTML forms-based administration interface only B. allow Company B administrators to use the HTML forms-based administration interface but only for access policy management C. allow Company B administrators to use the main Select Access administrator's applet and restrict their capability to user administration only D. allow Company B administrators to use the applet-based administration Policy Builder interface only and restrict the capability to user administration only Answer: A, D Question 12. What are two methods of discovering Web pages as Select Access resources? (Choose two.) A. launch a scan of the HTTP Web pages from the Policy Builder B. use a Validator plug-in to obtain the list of Web pages and store it directly in the LDAP directory server C. configure the Enforcer on the Web server to push the list of Web pages to the Policy Builder via the Validator D. import the list of Web pages into the Policy Builder from a text file containing URLs separated by carriage returns Answer: A, D Question 13. Which parameter of the Select Access Validator configuration should you alter to increase the frequency at which stale cache items are deleted from the Validator's cache? A. client idle timeout B. cache refresh interval C. cache cleanup interval D. maximum cache lifetime E. cache cleanup percentage Answer: C Question 14. Which three parameters can be configured in Select Identity's TruAccess.properties file? (Choose three.) A. the maximum number of retry attempts for sending e-mail B. the database type used as the Select Identity data repository C. the error message an administrator receives if an e-mail cannot be delivered D. the time interval that the e-mail daemon uses for sending new e-mail if the initial attempt is unsuccessful Answer: A, B, D Question 15. Which statement is true about Select Access? A. There can be no load balancing between Enforcers and Validators as only failover is possible. B. Enforcers can failover and load balance between Validators, but the default configuration does not include this. C. Enforcers, by default, failover as well as balance load between all available Validators using the round robin method. D. For failover and load balancing to work between the Enforcers and Validators, an external network load balancer must be used. Answer: C Question 16. Which format is used by the initial user load process in Select Identity? A. EDI B. XML C. LDIF D. SPML E. SNMP Answer: D Question 17. The Select Access query tool can be easily used to test which three aspects of performance? (Choose three.) A. Validator load B. stress testing C. application response time D. Select Access internal communication Answer: A, B, D Question 18. An administrator at ITCertKeys.com is registering a new user via delegated registration for a business service. When the administrator tries to display the delegated registration form in Select Identity, the following error message appears: View Not Found What should the administrator do to troubleshoot this problem? A. check the configuration of the appropriate context and ensure that the "Default View" is assigned for the "SELF:Add New User" Request event B. check the configuration of the appropriate context and ensure that the "Default View" is assigned for the "DELEGATED:Add New User" Request event C. check the configuration of the appropriate business relationship and ensure that the "Default View" is assigned for the "DELEGATED:Add Service" Request event D. check the configuration of the appropriate business relationship and ensure that the "Default View" is assigned for the "DELEGATED:Add New User" Request event Answer: D Question 19. Which three are key advantages of using Select Identity? (Choose three.) A. Java applet-based solution B. secure segmented audit data C. Contextual Identity Management (CIM) D. n-tier delegated administrative capability E. Java-based graphical user interface (GUI) Answer: B, C, D Question 20. Which capability in Select Identity is used to create a new User Account Login ID e-mail template? A. Services B. Reporting C. Notifications D. Workflow Studio Answer: C
|
Question 1. Which DHCP server gives secondary codecs in Cisco TelePresence CTS-3000 and CTS-3200 systems their IP addresses? A. DHCP server on the voice VLAN B. DHCP server on the primary codec C. DHCP server on the Cisco Unified Communications Manager D. DHCP server on the CiscoTelePresence Manager Answer: B Question 2. How do you calibrate the light meter from the Cisco recommended RRA tool kit? A. Press the Auto Adjust button on the meter. B. Turn the meter on and off. C. Cover the sensor with the cap and press the Zero button. D. Cover the sensor with the cap and press the Light Source button. Answer: C Question 3. What two options does an administrator have using WebUI for CTMS in Monitoring/Room Testing for any active meeting? (Choose two.) A. add a CTS System to a meeting B. view network statistics C. view meeting statistics D. start loopback E. force switch Answer: A, B Question 4. The Cisco Telepresence room Fluffy does not have an email account listed in the Unified CM. This is preventing the Cisco Telepresence Manager from synchronizing with the email address for the Cisco Telepresence Room in the Calendar server. Refer to the exhibit. You are using Cisco Telepresence Manager and have just added a new room in the Cisco Unified Communications Manager and have made test calls successfully. You run the Discover Rooms option under Discovery Service successfully. You then go into the Rooms section and see the status. Which is the cause of the problem? A. The Cisco Telepresence room Fluffy does not have an email account listed in the Unified CM. This is preventing the Cisco Telepresence Manager from synchronizing with the email address for the Cisco Telepresence Room in the Calendar server. B. The Cisco Telepresence room Fluffy has an email address listed in the Unified CM. The Calendar server does not have an account for the email address provided by the Unified CM. C. The Cisco Telepresence room Fluffy has an email address listed in the Unified CM. The Calendar server has an account for the email address provided by the Unified CM. The Cisco Telepresence Manager does not have proper privileges to view this account. D. The Cisco Telepresence room Fluffy has an email address listed in the Unified CM. The Calendar server has an account for the email address provided by the Unified CM. The Cisco Telepresence Manager cannot authenticate to the LDAP server and cannot log into the Calendar server to synchronize with the account. Answer: C Question 5. During the RRA, how should you hold the light sensor when taking the majority of light measurements? A. Horizontally, so it gets the direct lighting from ceiling light fixtures. B. Vertically, toward the displays to measure the light they put off. C. Horizontally, toward any untreated windows to measure light coming in. D. Vertically, so it is reading light as if it were hitting the participant's face. Answer: D Question 6. At a minimum, what must an administrator configure in the CUCM for the Cisco Telepresence Multipoint Switch? A. SIP trunk and route pattern B. H.323 gateway and route pattern C. H.323 gateway, route pattern, route list and route group D. SIP trunk, route pattern, route list and route group E. H.323 gateway, route pattern and route group F. route pattern, route list and route group Answer: A Question 7. Which QoS mapping is specific to Cisco Telepresence? A. CoS 5 to map to a DSCP value of 40 B. CoS 4 to map to a DSCP value of 46 C. CoS 3 to map to a DSCP value of 48 D. CoS 5 to map to a DSCP value of 16 E. CoS 4 to map to a DSCP value of 32 Answer: E Question 8. How is VIP mode enabled for a scheduled multipoint Cisco Telepresence meeting? A. through the Cisco IP phone interface B. through theWebUI on the CTMS C. through the CiscoTelepresence Manager D. through calendar scheduling interface Answer: B Question 9. Which three statements about the cabling of a Cisco Telepresence 3000 are true? (Choose three.) A. All speakers connect to the primary codec. B. All video cameras connect to the primary codec. C. All 65 inch plasma displays connect to the primary codec. D. Microphones connect to the corresponding codec. E. Speakers connect to the corresponding codec. F. Video cameras connect to the corresponding codec. G. Plasma displays connect to the corresponding codec. Answer: A, F, G Question 10. DRAG DROP Answer:
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.