|
Question 1. Scenario: An administrator is required to create a scan that will scan client devices to ensure that all clients running Windows XP Professional also have service pack 1(SP1) installed and running. All users in the environment are required to have a specific version of an antivirus software running on their systems. Due to the addition of a newly acquired office, the scan requirements have to be modified. Newly acquired remote offices, which will obtain access to company resources through Access Gateway, have client devices that run on Windows 98 and are not required to submit to the same scans that are required of the other users. By configuring rules for the end point analysis scan, the administrator can ensure that only the devices in the new offices will not be required to meet the same security requirements that are required for the other corporate users. Which condition type should be added to the rules for the scan to ensure that the requirements for the scenario are met? A. Logon point B. Property value C. Operating system D. Client device regional locale Answer: C Question 2. Scenario: Advanced Access Control is configured to use LDAP for primary authentication and authorization. An administrator needs to enable pass-through authentication in order for Active Directory credentials to be passed automatically to applications. What is the administrator required to do to meet the requirements of this scenario? A. Ensure that the same logon account exists for LDAP and Active Directory. B. Ensure that LDAP and Active Directory use the same trusted root certificate. C. Ensure that the LDAP server is on the same network as the Active Directory server. D. Ensure that the same administrative account exists for the LDAP and Active Directory. Answer: A Question 3. When creating a typical filter that consists of three logon points, which logical operator is used to combine them? A. OR B. NOT C. AND D. XOR Answer: A Question 4. An administrator needs to add a file share as a resource to the default navigation page. In order for users to be able to access the file share resource from the default navigation page, which three steps are required? (Choose three.) A. Publish the file share. B. Ensure that the file share exists prior to defining it for the access server farm. C. Ensure that the specified users have NTFS read permissions to the file share. D. Create a policy granting access to specified users in the Access Gateway Administration Tool. E. Create a policy granting access to the file share to specified users in the Access Suite Console. Answer: A, C, E Question 5. What happens when the Allow Logon Resources setting is NOT selected in the access policy? A. The access policy only controls the denied logon privileges. B. The access policy only controls whether users are allowed to log onto the farm. C. The access policy does not control whether users are allowed to log onto the farm. D. The access policy does not control any settings except for those that are specified in the Allow Logon setting. Answer: C Question 6. Scenario: An administrator must configure a web email resource to be integrated with the corporate access center. In the access server farm there are three servers in use: “access_agent” is configured as an agent server; “access_web” is configured as a web server; and “Access_1” is configured to serve as the agent and license server. In addition, the Exchange server is named exchange_hq. Which configuration must the administrator perform to ensure that users are provided indirect access to the web email through the corporate access center? A. Configure the website viewer in the portal to point to http://Access_1/citrixfei/classic.asp B. Configure the website viewer in the portal to point to http://Access_web/citrixfei/classic.asp C. Configure the website viewer in the portal to point to http://Access_agent/citrixfei/classic.asp D. Configure the website viewer in the portal to point to http://Exchange_HQ/citrixfei/classic.asp Answer: B Question 7. What are two available roles for assignment to a given server in the access server farm? (Choose two.) A. Web server B. State server C. Agent server D. Access Gateway server Answer: A, C Question 8. Which three can directly reference scan outputs? (Choose three.) A. Filters B. Policies C. Other scans D. Logon points E. Web resources Answer: A, C, D Question 9. Scenario: ITCertKeys.com's Contractors Active Directory group is allowed to launch Outlook and SAP only when using a corporate-supplied laptop. The same users are allowed to view Office and Adobe Reader applications regardless of the accessing device. Which type of scan can the administrator perform to ensure that the requirements for this scenario are met? A. Citrix scans for hardware types B. Citrix scans for MAC addresses C. Citrix scans for antivirus software D. Citrix scans for operating systems Answer: B Question 10. When using an MSDE database to store configuration data for your access server farm, what must be specified during the initial configuration of the Advanced Access Control server? A. A name for the database B. The location of the MSDE database C. The name of the access server farm D. An account in the Administrators group on the Advanced Access Control server Answer: C Question 11. Which two steps must be taken when creating a typical filter? (Choose two.) A. Construct a logical expression B. Select an authentication profile C. Provide a unique name for the filter D. Select endpoint analysis scan output E. Choose at least one condition to be included in the filter F. Enter SSL client certificate requirements will be used to filter access Answer: C, E Question 12. When creating a single web resource containing multiple URLs, which consideration must be taken into account? A. A separate policy must be attached to each URL in the resource. B. Applying the "same origin" Java script to the site will protect it from malicious scripts when it is created from multiple URLs. C. A website that is secure from cross-site scripting is the best candidate for creating web resources containing multiple URLs. D. Bypassing the "web proxy URL rewriting" protects web resources from vulnerabilities before creating them as web resources from multiple URLs. Answer: C Question 13. When creating a custom filter that requires client devices to have a specific certificate installed and to enter from a specific logon point but NOT pass an endpoint analysis scan which detects a worm on the client system, which logical expression should be used to define the conditions under which a connection is permitted? (For all options, X represents the certificate filter, Y represents the logon point, and Z represents the passing of an endpoint analysis scan.) A. (X OR Y) AND Z B. (X OR Y) AND NOT Z C. (X AND Y) AND NOT Z D. (X AND Z) AND NOT Y Answer: C Question 14. Which policy setting is the only permission that can be set for network resources? A. Upload B. Access C. VPN Tunnel D. File Type Association Answer: B Question 15. In an environment where client devices must pass two file scans before being permitted access to the network, which logical expression should be used to create a continuous scan? A. NOT Y, where Y represents a failed scan B. X OR Y, where X and Y represents the file scans C. X AND Y, where X and Y represents the file scans D. (X AND Y) OR Y, where X and Y represents the file scans Answer: C Question 16. An administrator is instructed to configure advanced authentication using RADIUS profile and must define RADIUS authentication. Which node in the console tree should the administrator select to define RADIUS authentication? (Click on the exhibit button to display the screen shot.) Exhibit: A. Servers node B. Resources node C. Configuration Tools node D. Access Server Farm node Answer: D Question 17. Which of the following is the minimum server memory requirement for the installation of the Advanced Access Control? A. 128 MB memory B. 256 MB memory C. 512 MB memory D. 1024 MB memory Answer: C Question 18. When a logon point is renamed just after it is deployed, __________. (Fill in the blank with a listed option.) A. it can no longer be used B. it must be redeployed using the update function in the Access Suite Console C. the Advanced Access Control setup CD must be used to redeploy the updated logon D. it must be redeployed using the update/refresh function in the Server Configuration Wizard before users can begin using the logon point to access resources Answer: D Question 19. Which statement is true about access policies? A. If multiple policies apply to a resource, a policy that allows access permission wins over other policies that denies access permission. B. Access to published applications and resources on a Citrix Presentation Server is controlled by Advanced Access Control Presentation Server policies. C. Access to published resources on Citrix Presentation Server depends on the properties of Advanced Access Control policies and the logon point that is used to access the resources. D. It is possible to select policy settings on the configure settings page for types of resources that you did not select for the policy to control and add those types of resources to the policy at a later time. Answer: D Question 20. From which node in the Access Suite Console can an administrator configure event logging? A. Servers node B. Resource node C. Endpoint Analysis node D. Access Server Farm node Answer: D
|
Question 1. Which statement about Cisco Unified Communications Manager Express and Cisco Unified Communications Manager is correct? A. Cisco Unified Communications Manager is router-based and scales up to 24000 users. B. Cisco Unified Communications Manager is server-based and Cisco Unified Communications Manager Express scales up to 300 users. C. Cisco Unified Communications Manager Express is router-based and Cisco Unified Communications Manager scales up to 240 users. D. Cisco Unified Communications Manager is server-based and scales up to 24000 users. E. Cisco Unified Communications Manager Express is router-based and Cisco Unified Communications Manager scales up to 30000 users. Answer: E Question 2. A company's mission is to support its customers' technical needs. Its consultants work from home or on site. They must often work in teams to exchange information about new products and implementations. Choose the Cisco Unified Communications tool, features, and functions that will best support this company's goal. A. Collaboration, bringing together voice, video, and web conferencing B. Contact Center solutions, delivering intelligent contact routing, desktop and telephony integration, and multichannel contact management C. Unified Messaging, delivering every voice, email, and fax message into a single inbox D. Presence, providing information about consultants, such as availability and busy status Answer: A Question 3. An operations manager compares the cost of upgrading their current system to the cost of implementing a fully-featured Cisco Unified Communications system. She objects that the upgrade may not be justifiable. Which two responses would most likely best answer to this objection? (Choose two.) A. Seamlessly integrating your current PBX infrastructure with a full IP solution is the best way to Stay ahead of the competition. B. A Unified Communications solution will reduce more toll charges than an IP-enabled PBX. C. The scalability of Cisco Unified Communications solutions will enable you to stay a step ahead of the competition. D. Simply enabling the current system may not accomplish these business objectives. E. Accommodating unplanned growth and customer-driven changes can best be addressed with a distributed PBX solution. Answer: C, D Question 4. What are two features of Cisco Unity Express? (Choose two.) A. support for 12 languages B. full-featured voice mail C. IBM Lotus Domino or Microsoft Exchange message store D. scalable performance E. deployment flexibility Answer: D, E Question 5. A large chemical company with a limited capital expenditure budget is considering a much-needed investment in a converged IP network but is having trouble justifying the initial costs to management. Which solution would you recommend? A. purchase B. lease C. Cisco Unity Unified Messaging D. IP-enabled PBX Answer: B Question 6. A potential customer requests a reliable, cost-effective method of monitoring and evaluating the quality of voice in Cisco Unified Communications solutions. This customer needs a tool which continuously monitors active calls supported by the Cisco Unified Communications system and provides near-realtime notification when the voice quality of a call, represented as end-user experience expressed by a Mean Opinion Score, fails to meet a user-defined quality threshold. Which of the following tools should an account manager propose? A. Cisco netManager Unified Communications B. Cisco Network Analysis Module C. Cisco Voice Provisioning Tool D. Cisco Smart Care Services E. Cisco Unified Service Monitor, which includes Cisco 1040 sensors Answer: E Question 7. Read the customer objection and select the two best answers. (Choose two.) Telecommunications manager: Everyone knows that Cisco is good at data, but you simply do not have voice experience. None of your account managers, systems engineers, or professional service people truly understands the voice environment. A. I understand your concern, especially because we are so well known for data. In addition to our data experience, we are also very familiar with the voice environment. In fact, we helped invent voice technology. B. I am glad you brought that up! It is true that at one time, we were focused more on data than on voice. Today, however, Cisco has a large percentage of employees with voice experience. C. Thank you for mentioning that point. Because our focus is on QoS, which is currently not supported by the Internet, people often believe that Cisco has no voice experience. D. That is a valid concern, and I would like to address it. While it is true that we are strong in the data arena, we are also actively and aggressively investing in staff voice skills, and also recruiting the finest voice professionals in the market. The strength of our voice team has brought us a great deal of respect in the marketplace. Answer: B, D Question 8. Based on the scenario below, what is the primary need of the finance manager? Account Manager: Have you considered the potential TCO savings that you can achieve with a Unified Communications upgrade? Finance manager: To some degree, yes, but it sounds like a big investment, not only in terms of technology, but even more so in terms of staff and maintenance. A. reduce operational costs B. automate financial reports C. increase revenue D. increase the flexibility of revenue projections Answer: A Question 9. A Cisco customer has a management team, each member of which has a number of needs. Operations manager: Improve order processes Improve the ability to make accurate forecasts Finance manager: Reduce the TCO of the existing IP communications infrastructure IT manager: Improve network reliability Streamline the delivery of end-user support Which business need would be the primary Cisco Unified Communications solution sales driver? A. reduce the number of employees B. reduce operating costs C. increase revenue generation D. facilitate future expansion Answer: B Question 10. Which of the following features could not be implemented with Cisco Unified Communications Manager Express? A. XML applications B. Auto-attendant capabilities C. Integrated messaging D. Cisco Unified Presence Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.