|
Question 1. In Select Identity, an entitlement is . A. an abstraction of the resource privileges granted to an identity B. an abstraction that organizes privileges and permissions, and controls authorization C. a Select Identity concept that defines a logical grouping of users that can access a service D. a Select Identity abstraction that defines how a logical grouping of users will access a Select Identity service E. a name-value pair that can be created or changed at runtime in a workflow instance through actions, a workflow API call, or returned by an application invocation Answer: A Question 2. Which four design patterns does Select Identity leverage that promote adaptability, modularity, extension and reuse? (Choose four.) A. dynamic user grouping B. n-tier administration delegation C. resource-centric user provisioning D. services-based resource abstraction E. fixed, variable and rule-based entitlement assignment F. role-based access control (RBAC) entitlement assignment Answer: A, B, D, E Question 3. Which process should be used to load existing user accounts from a resource into Select Identity? A. bulk add B. bulk move C. reconciliation D. auto-discovery Answer: D Question 4. Which performance optimization is most likely to improve the speed of user lookups from Select Access at the time of authentication? A. use SSL between the Validators and the directory server B. use a directory server that is also a Windows domain controller C. configure the Validator to failover from one directory server to another D. index the most frequently-searched user attributes in the directory server Answer: D Question 5. Which four statements are true about Select Access setup? (Choose four.) A. The setup program contains a repair facility to restore initial setup. B. The setup program can be run centrally to install Web Server Enforcers. C. The Select Access setup tool de-registers components that are being uninstalled. D. The setup program should generally be run on every server that will host a Select Access component. E. The Select Access setup program should only be run with UNIX root or Windows Administrator privilege. F. A Java runtime environment should be installed before using the setup program to install an Audit Server. Answer: A, C, D, E Question 6. What are three competitive advantages of the Open View Identity Management solution? (Choose three.) A. modularity - manage discretely or collectively B. simplification - ease of use/ease of integration C. centralized control - manage all network devices D. automated updates - push software updates to affected systems E. open architecture - standards-based components and processes Answer: A, B, E Question 7. Which type (s) of services can be created in Select Identity? A. business service only B. consumer service only C. composite service only D. business service and composite service E. composite service and consumer service Answer: D Question 8. When performing a user search with no search criteria specified in Select Identity, it takes more than 30 seconds to return. Assuming that 100000 users have already been loaded into the system, what is the most likely source of the degradation in performance? A. database B. load balancer C. network latency D. application server Answer: A Question 9. Your client needs to create a new attribute called Employee Type, which can only be populated with one of five possible values. Which type of function should you use to meet this requirement? A. value validation function B. value limitation function C. value constraint function D. value generation function E. value verification function Answer: C Question 10. Which two statements are true about the Select Access Rule Builder? (Choose two.) A. It is possible to add new types of authentication servers using the Rule Builder. B. Both access policy rules as well as workflow rules can be created using the Rule Builder. C. The Rule Builder is a graphical interface that allows creation of conditional access rules. D. The Rule Builder requires administrators to input rules by typing them in a specific syntax with Boolean operators such as AND OR. Answer: B, C Question 11. Company A wants to allow administrators of Company B to add Company B employees to the Select Access user repository of Company A. No other administration capability needs to be delegated. Which two actions achieve this result? (Choose two.) A. allow Company B administrators to use the HTML forms-based administration interface only B. allow Company B administrators to use the HTML forms-based administration interface but only for access policy management C. allow Company B administrators to use the main Select Access administrator's applet and restrict their capability to user administration only D. allow Company B administrators to use the applet-based administration Policy Builder interface only and restrict the capability to user administration only Answer: A, D Question 12. What are two methods of discovering Web pages as Select Access resources? (Choose two.) A. launch a scan of the HTTP Web pages from the Policy Builder B. use a Validator plug-in to obtain the list of Web pages and store it directly in the LDAP directory server C. configure the Enforcer on the Web server to push the list of Web pages to the Policy Builder via the Validator D. import the list of Web pages into the Policy Builder from a text file containing URLs separated by carriage returns Answer: A, D Question 13. Which parameter of the Select Access Validator configuration should you alter to increase the frequency at which stale cache items are deleted from the Validator's cache? A. client idle timeout B. cache refresh interval C. cache cleanup interval D. maximum cache lifetime E. cache cleanup percentage Answer: C Question 14. Which three parameters can be configured in Select Identity's TruAccess.properties file? (Choose three.) A. the maximum number of retry attempts for sending e-mail B. the database type used as the Select Identity data repository C. the error message an administrator receives if an e-mail cannot be delivered D. the time interval that the e-mail daemon uses for sending new e-mail if the initial attempt is unsuccessful Answer: A, B, D Question 15. Which statement is true about Select Access? A. There can be no load balancing between Enforcers and Validators as only failover is possible. B. Enforcers can failover and load balance between Validators, but the default configuration does not include this. C. Enforcers, by default, failover as well as balance load between all available Validators using the round robin method. D. For failover and load balancing to work between the Enforcers and Validators, an external network load balancer must be used. Answer: C
|
Question 1. What is the maximum number of users that can be logged into an MSA2012 (FC or iSCSI) controller at any one time? A. 1 monitor and 5 manage B. 4 monitor and 2 manage C. 2 monitor and 3 manage D. 5 monitor and 1 manage Answer: D Question 2. What is the maximum affordable amount of business data loss? A. Risk Tlerance Limit B. Recovery point objective C. Critical mass of information D. Business continuity threshold Answer: B Question 3. You are installing an MSA2012i array. The customer asks about the data protection features of the new array. Which capabilities does it have? A. 64 snapshots and 64 volume copies B. 64 snapshots and 128 volume copies C. 128 snapshots and 64 volume copies D. 128 snapshots and 128 volume copies Answer: B Question 4. Click the Exhibit button. Which functions does a Network Storage Router (NSR) provide? Exhibit: A. Fibre Channel-to-SCSI bridge B. Data encryption to the tape device C. Backup accelerator for 2Gb SANs D. Two-stage backup capabilities for SAN environments Answer: A Question 5. Which components can be managed through the management software of the MSA2000 family? (Select Two) A. Vdisk B. Disk Group C. Data Replication D. Snap pool Answer: A, D Question 6. What is a volume copy? A. A full copy of target data B. Backup copy of source data C. A full allocation copy of all volume source data D. Full copy of all configured volumes Answer: C Question 7. Which type of software is the HP StorageWorks MSA Storage Management Utility? A. Target based web application B. Serial based web application C. Java based secure management D. Windows based remote connectivity Answer: A Question 8. What does MPIO do if the Device Specific Module (DSM) returns an inactive path? A. Initiates a path failover B. Performs automatic path verification C. Removes the path from the load balancing policy D. Changes the storage LUN to write-through mode Answer: A Question 9. What is the maximum acceptable time interval for business data unavailability? A. Installation of backup procedure B. Recovery point objective C. Half an hour down time D. During off times maximum 30 minutes Answer: B Question 10. Which component enables access to block storage on a Fiber Channel SAN across an Ethernet network? A. Ethernet Switch B. Fibre Channel Switch C. FC-IP gateway connector D. iSCSI to Fiber Channel bridge Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.