|
Question 1. At a customer site, you have defined VLAN 128 on a ProCurve Switch 5300xl and on a connected Access Point 530. You must now configure an Access Profile in Identity Driven Manager that will assign Marketing users to this VLAN. However, the VLAN is not listed among the choices for the Access Profile. Which step is necessary to make the VLAN available? A. Define the AP 530 as a Location. B. Perform a rediscovery of the switch. C. Define the VLAN as a Network Resource. D. Import Marketing users from Active Directory. Answer: B Question 2. Which applications must be hosted on the same computer to enable ProCurve Manager Plus/Identity Driven Manager to function in a Windows environment? (Select two.) A. PCM+ server B. DHCP server C. Identity Driven Manager D. Internet Authentication Service E. Active Directory domain controller Answer: A, C Question 3. At a customer site, you must configure Identity Driven Manager to enforce access policies for users who will use 802.1X authentication to connect through an Ethernet port on a ProCurve Switch 5300xl. Where can you enter the RADIUS shared secret? A. CLI of the Switch 5300xl B. network setup for client computers C. Remote Access Policy on RADIUS server D. Location setting in Identity Driven Manager Answer: A Question 4. At a customer site where PCM+/IDM is deployed, 50 new users are added to Active Directory groups already imported into IDM. When will these users appear in IDM? A. when PCM+/IDM performs auto-discovery B. when the IDM RADIUS Agent polls Active Directory C. when the users are authenticated through RADIUS D. when the IDM Access Policy is deployed to the realm Answer: C Question 5. In Identity Driven Manager, which object contains the Time, Location, and System parameters? A. Identity Profile B. Access Profile C. Access Policy Group D. Network Resource Access Rule Answer: C Question 6. In Identity Driven Manager, which user-defined object identifies specific switch ports and access points where users connect to the network? A. Location B. Access Profile C. Connection Profile D. Network Resource Answer: A Question 7. At a customer site, a technician creates a new Sales group in Active Directory and adds 20 new users to the group. When the technician imports the users into IDM, they are all assigned to the Default Access Policy Group. What is the cause of this assignment? A. The technician did not include the Sales group in the import. B. The technician did deploy the policy to the realm after importing users. C. The technician did not enable the IDM RADIUS Agent before importing users. D. The technician did not create a Sales Access Policy Group before importing users. Answer: A Question 8. At a customer site, a technician configures 802.1X authentication for four switch ports on a ProCurve Switch 5300xl. The technician does not issue a command specifying an unauthenticated VLAN ID. Presuming DHCP is properly configured for all VLANs, how will this configuration affect VLAN membership and IP addressing for unauthenticated users? A. The users will receive addresses in the range associated with VLAN 1. B. The users will receive addresses in the range associated with the untagged VLAN on the ports where they connect. C. The users will be assigned addresses in the range associated with the VLAN ID returned by the RADIUS server. D. The users will not be assigned to any VLAN. Windows XP clients will receive private addresses in the 169.254.0.0/16 range. Answer: D Question 9. In a Windows environment, what is a role of the IDM RADIUS Agent? A. to add RADIUS attributes to a RADIUS-ACCEPT packet from IAS B. to act as a RADIUS proxy server for all clients associating through Locations defined in IDM C. to monitor the Windows Active Directory and IAS for evidence of unauthorized logins or access attempts D. to ensure that user accounts created in RADIUS databases on ProCurve access points and are correctly added to Active Directory on the Domain Controller Answer: A Question 10. What does the session information shown in the exhibit indicate about this user? A. The user received an IP address in the range of 10.0.10.0/24. B. The user received an IP address in the VLAN 1 address range. C. The user received an IP address in the VLAN configured on the switch port where the user connected. D. The user received an IP address in the VLAN associated with the Marketing profile in Identity Driven Manager. Answer: C
|
Question 1. What are three functions of the BlackBerry Policy Service? (Choose three.) A. Sends a set of rules that configures BlackBerry device security features B. Polls for applications that are installed on the BlackBerry device C. Compresses and encrypts data to and from the BlackBerry device D. Sends service books that configure BlackBerry device functionality E. Synchronizes any custom security settings on the BlackBerry device Answer: A, B, D Question 2. A system administrator wants to wirelessly deploy a third-party application to multiple BlackBerry devices while providing the BlackBerry device users with the ability to remove the software at a later time. What must the disposition of the assigned application control policy be set to, in order to accomplish this? (Choose one.) A. Required B. Optional C. Disallowed D. Prompt E. Available Answer: B Question 3. When setting up a software configuration, the Configuration Status field shows Unknown Configuration for a specific BlackBerry device user account. Which statement is true? (Choose one.) A. The BlackBerry Enterprise Server has not polled the BlackBerry Configuration Database for which applications need to be installed/removed on the BlackBerry device. B. The user has not yet been assigned to a software configuration. C. The delivery method within the software configuration for this application has not yet been set. D. The Disallow Third-Party Downloads IT policy has been set to True. E. The Applications directory needs to be indexed so the software configuration status can be updated to reflect the current applications that need to be installed or removed. Answer: A Question 4. A company utilizing a segmented network, installs the BlackBerry Attachment Server on its own server in a separate segment from the BlackBerry Enterprise Server. With which component would the BlackBerry Attachment Server be unable to communicate if it was installed in a different segment of the network? (Choose one.) A. Microsoft Exchange Server B. Microsoft SQL Server C. BlackBerry Messaging Agent D. BlackBerry Dispatcher E. BlackBerry Controller Answer: C Question 5. A new BlackBerry device user is unable to perform a wireless enterprise activation because there is insufficient network coverage. The user has the BlackBerry Desktop Manager installed. When attempting to perform a wired enterprise activation, the enterprise activation is unable to initialize. Which three actions ensure the enterprise activation initializes? (Choose three.) A. Switch to a new USB port on the computer. B. Create a new MAPI profile on computer. C. Enable port 4101 on the BlackBerry Enterprise Server. D. Delete and undelete the Desktop [SYNC] service book on the BlackBerry device. E. Uninstall and reinstall the BlackBerry Desktop Manager software on the computer. Answer: A, B, C Question 6. A company utilizing a segmented network structure recently installed the BlackBerry Collaboration Service, configured it to use the TLS protocol for Microsoft Windows Messenger on its own server, and placed it in a network segment from the Microsoft Live Communications Server. Which port must be open on the internal firewall to allow TLS traffic? (Choose one.) A. 5061 B. 5060 C. 443 D. 8443 E. 1533 Answer: A Question 7. A PIN message is sent from the BlackBerry device and a letter D is displayed above the checkmark beside the message in the message list. What does this indicate about the status of the message? (Choose one.) A. It is delayed. B. It is denied. C. It is delivered. D. It is deleted. E. It is dropped. Answer: C Question 8. A company needs to reduce the load on the Microsoft SQL Server hosting the BlackBerryConfiguration Database. Which component can be configured to reduce the number of queries made by the BlackBerry Enterprise Server to the database? (Choose one.) A. Microsoft SQL Query Analyzer B. BlackBerry Manager C. Database Notification System D. Database Replication System E. Microsoft SQL Server Agent Answer: C Question 9. What option can be disabled to restrict Microsoft Excel attachments only for the BlackBerry Attachment Service? (Choose one.) A. The attachment type using the BlackBerry Server Configuration utility B. The attachment type using an IT policy setting in the BlackBerry Manager C. Attachment viewing through the BlackBerry device user properties on the BlackBerry Manager D. The attachment type using the BlackBerry Resource Kit E. The BlackBerry Attachment Service through Microsoft Windows services Answer: A Question 10. Which type of database replication is supported in the BlackBerry Enterprise Solution? (Choose one.) A. Transactional B. Analytical processing C. Merge D. Snapshot E. Architectural Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.