Question 1
Question
When data changes in the Identity Vault or a connected application, which processes the
changes?
Answer
-
Drivers
-
Remote Loader
-
Identity Vault
-
Metadirectory Engine
-
Connected application
Question 2
Question
Which statement is true?
Answer
-
When an event occurs in the Identity Vault, Identity Manager creates an XML document that
describes the Identity Vault event and submits it through the Publisher channel to a driver shim.
-
When an event occurs in the Identity Vault, Identity Manager creates an XML document that
describes the Identity Vault event and submits it through the Subscriber channel to a driver shim.
-
When an event occurs in a connected system, Identity Manager creates an XML document that
describes the Identity Vault event and submits it through the Subscriber channel to a driver shim.
-
When an event occurs in the Identity Vault, a driver shim creates an XML document that
describes the Identity Vault event and submits it through the Subscriber channel to Identity
Manager.
-
When an event occurs in a connected system, a Driver Shim creates an XML document that
describes the Identity Vault event and submits it through the Subscriber channel to Identity
Manager.
Question 3
Question
Which statements are true? (Choose 2.)
Answer
-
When an event is being sent to a driver, it is a notification.
-
When an event is being sent to a driver, it is a command.
-
When an event is being sent to Identity Manager, it is a command.
-
When an event is being sent to Identity Manager, it is a notification.
-
Events and commands are handled the same way within an IDM 4 environment.
Question 4
Question
What does a Driver object contain? (Choose 2.)
Question 5
Question
Identity Manager uses a MetaDirectory Engine to process Identity Vault data and events. What
component assures changes in the Identity Vault are not lost if a connected system goes offline?
Answer
-
Partition
-
Obit flag
-
Change Log
-
Event Cache
Question 6
Question
An Identity Manager Job can only interact with which driver channel?
Answer
-
Input
-
Sender
-
Output
-
Receiver
-
Publisher
-
Placement
-
Subscriber
Question 7
Question
Which installation mode is supported by the integrated installer?
Answer
-
Silent mode
-
Non-root mode
-
Console mode
-
AutoYaST mode
-
Standalone mode
Question 8
Question
Which statements about the Integrated Installer are true? (Choose 2.)
Answer
-
It automatically handles dependencies
-
It automatically installs all of the drivers
-
The iManager plug-in needs to be manually installed
-
It exists only for the Windows operating system family
Question 9
Question
Which task within Novell iManager allows administrators to view all objects that are associated
with a particular Novell IDM driver?
Answer
-
Object Inspector
-
Driver Inspector
-
DriverSet Inspector
-
Driver Cache Inspector
Question 10
Question
What is the minimum RAM system requirement for Designer?
Answer
-
128 MB
-
256 MB
-
512 MB
-
1024 MB
-
2048 MB
Question 11
Question
When using Designer, which modeling mode is used to do all low-level operations with driver sets,
drivers, policies and applications?
Answer
-
Table Mode
-
System Mode
-
DataFlow Mode
-
Architect Mode
-
Developer Mode
Question 12
Question
Which view enables you to view the filters that allow the data to flow between all of the systems
and the Identity Vaults as well as view how passwords flow through the different systems?
Answer
-
Project view
-
Outline view
-
Dataflow view
-
Navigator view
-
Policy Set view
Question 13
Question
When using Designer, a perspective is a collection of related views and editors. Which perspective
should be open the first time you run the application?
Answer
-
Debug perspective
-
Designer perspective
-
Java/Java Browsing perspective
-
Java Type Hierarchy perspective
-
Plug-in Development perspective
Question 14
Question
Which view do you use to access Policy Simulator? (Choose 2.)
Answer
-
The Tasks view
-
The Outline view
-
The Project view
-
The Navigator view
-
The Policy Flow view
Question 15
Question
When you start Designer for the first time or start Designer without a project listed, which should you first do?
Answer
-
Make sure that the Debug perspective is selected.
-
Make sure that the Plug-in perspective is selected.
-
Make sure that the Designer perspective is selected.
-
Make sure that the Java/Java Browsing perspective is selected.
-
Make sure that the Java Type Hierarchy perspective is selected.
Question 16
Question
When using Designer, which view do you use to import driver sets, drivers, and channels from the
file system?
Answer
-
The Tasks view
-
The Project view
-
The Outline view
-
The Navigator view
-
The Policy Flow view
Question 17
Question
When checking in a project to a Version Control Server, you will need to specify a file path to your
Subversion server or a URL to the Subversion server. If you specify a URL, which protocols are
supported? (Choose 4.)
Answer
-
FTP
-
NFS
-
SVN
-
HTTP
-
SFTP
-
HTTPS
-
SVN + SSH
Question 18
Question
When is the package catalog created?
Answer
-
When a package is installed
-
When a driver object is created
-
When a Driver Set object is created
-
When a project is created or imported
Question 19
Question
Which statement is true regarding packages?
Answer
-
You can downgrade any package that has been upgraded.
-
You can delete packages from the package catalog at anytime.
-
You can only upgrade packages that have been added to drivers.
-
Before you can import packages into the package catalog, you must install them.
Question 20
Question
When you install Active Directory drivers, you must choose an authentication method.
Authentication identifies the driver shim to Active Directory and, potentially, to the local machine.
Which statements are true regarding the Negotiate authentication method? (Choose 2.)
Answer
-
This is the preferred authentication method.
-
This can be installed on a server that is not a member of the domain.
-
This uses Kerberos, NTLM, or a pluggable authentication scheme if one is installed.
-
This is used when the server hosting the driver shim is not a member of the domain.
-
When using this, some provisioning services, such as Exchange mailbox provisioning and
password synchronization, are unavailable
Question 21
Question
If you map the eDirectory attribute of Login Expiration Time to the Active Directory attribute of
accountExpires, when does the account in Active Directory expire?
Answer
-
A day later than the time set in eDirectory
-
A day earlier than the time set in eDirectory
-
An hour later than the time set in eDirectory
-
At the same time as the time set in eDirectory
-
An hour earlier than the time set in eDirectory
Question 22
Question
Which method can be used to start the process of installing Active Directory driver packages?
Answer
-
In the Modeler, right-click the driver set where you want to create the driver; then
select New > Driver to display the Driver Configuration Wizard.
-
In the Modeler, right-click the Identity Vault where you want to create the driver; then
select New > Driver to display the Driver Configuration Wizard.
-
In the Modeler, right-click the server where you want to create the driver; then
select New > Driver to display the Driver Configuration Wizard.
-
In the Modeler, right-click the application where you want to create the driver; then
select New > Driver to display the Driver Configuration Wizard.
-
In the Modeler, right-click the package catalog where you want to create the driver; then
select New > Driver to display the Driver Configuration Wizard.
Question 23
Question
When installing Active Directory driver packages, you can also install optional features for the Active Directory driver. Which feature should you select if you are using the Identity Reporting Module?
Question 24
Question
In which order should you create and start an Active Directory driver?
Answer
-
Import the current driver packages 2) Install the driver packages 3) Deploy the driver 4)
Configure the driver 5) Start the driver
-
1) Install the driver packages 2) Import the current driver packages 3) Deploy the driver 4)
Configure the driver 5) Start the driver
-
1) Install the driver packages 2) Import the current driver packages 3) Deploy the driver 4) Start
the driver 5) Configure the driver
-
1) Import the current driver packages 2) Install the driver packages 3) Configure the driver 4)
Deploy the driver 5) Start the driver
-
1) Import the current driver packages 2) Install the driver packages 3) Deploy the driver 4) Start
the driver 5) Configure the driver
Question 25
Question
When installing the Active Directory Driver, which options are available when you are selecting the
desired form for the placement of new objects? (Choose 2.)
Question 26
Question
In an Active Directory environment, which tools enable you to view and manage the associations
between drivers and objects? (Choose 2.)
Question 27
Question
Which allows you to securely store multiple passwords for a driver?
Answer
-
Named Passwords
-
Universal Password
-
Password Policy object
-
Event Auditing Service
-
Password Synchronization
Question 28
Question
To which can you add Named Passwords? (Choose 2.)
Answer
-
Server
-
Drivers
-
Driver Sets
-
Applications
-
Identity Vaults
Question 29
Question
You have noticed that a server is not listed in the Servers tab on the driver or driver set. Which
may resolve this issue?
Answer
-
Revert back to an older driver.
-
Revert back to an older driver set.
-
Delete the problem driver and reinstall it.
-
Delete the related driver set and then reinstall it.
-
Disassociate the driver set object and the server and then re-associate them.
Question 30
Question
Which statements are true regarding Global Configuration Values (GCVs)? (Choose 2.)
Answer
-
GCVs are variables.
-
GCVs are constant values.
-
GCVs can be changed at runtime.
-
GCVs are accessible to the tree and network.
-
GCVs are globally accessible to the driver and driver set.
Question 31
Question
Which correctly shows the precedence of Global Configuration Values (GCVs)?
Answer
-
1) GCVs from the driver set Global Configuration list 2) GCVs from the driver Global
Configuration list 3) GCVs from the driver 4) GCVs from the driver set
-
1) GCVs from the driver set Global Configuration list 2) GCVs from the driver Global
Configuration list 3) GCVs from the driver set 4) GCVs from the driver
-
1) GCVs from the driver 2) GCVs from the driver set 3) GCVs from the driver Global
Configuration list 4)GCVs from the driver set Global Configuration list
-
1) GCVs from the driver 2)GCVs from the driver Global Configuration list 3) GCVs from the
driver set 4)GCVs from the driver set Global Configuration list
Question 32
Question
Which drivers have Remote Loader capability? (Choose 3.)
Answer
-
JDBC
-
LDAP
-
eDirectory
-
Active Directory
-
Entitlement Services
Question 33
Question
Which pre-defined jobs operate at the driver set level? (Choose 2.)
Answer
-
Driver Health
-
Schedule Driver
-
Subscriber Channel Trigger
-
Random Password Generator
-
Password Expiration Notification
Question 34
Question
What type of Identity Manager Event does a Subscriber Trigger Event Job create?
Answer
-
sync
-
query
-
modify
-
status
-
trigger
-
triggerless
Question 35
Question
Using iManager, what do you need to select to allow you to see the Filter icons so that you can
edit filters?
Answer
-
The Driver
-
The Driver Set
-
The Application
-
The Identity Vault
Question 36
Question
Which statements about filters are true? (Choose 2.)
Answer
-
You cannot export a filter from a driver.
-
You can configure a filter policy for a driver set.
-
You can add a class or attribute to a filter policy.
-
There are separate filter policies for the Publisher and the Subscriber channels.
-
The same filter policy is used for both the Publisher and the Subscriber channels.
Question 37
Question
Which policy primarily handles the conversion of data formats from data that the Metadirectory
engine provides to data that the application shim expects?
Answer
-
Creation policy
-
Matching policy
-
Placement policy
-
Input Transformation policy
-
Event Transformation policy
-
Output Transformation policy
Question 38
Question
When an XML document has an input tag type, which are supported inputs? (Choose 4.)
Answer
-
<add>
-
<copy>
-
<find>
-
<delete>
-
<format>
-
<modify>
-
<rename>
Question 39
Question
What is wrong with this add event?
<nds>
<input>
<add class-name="" event-id="idv-jdbc-staff#Publisher#696" qualified-src-dn="O=vault\OU=employees\CN=overtestra" src-dn="\IDVVAULT\vault\employees\overtestra" src-entry-id="136443">
<association state="pending"></association>
<add-attr attr-name="CN">
<value naming="true" timestamp="1206986293#34" type="string">overtestra</value>
</add-attr>
</add>
</input>
</nds>
Answer
-
The Class name is missing.
-
The timestamp is incorrect
-
The association state is pending.
-
The src-dn is improperly formatted.
Question 40
Question
Which Policy Sets are applied only during an add event?
Answer
-
Matching, Create, and Placement
-
Input Transformation, Matching, and Create
-
Matching, Create, and Schema Transformation
-
Input Transformation, Schema Transformation, and Command Transformation
Question 41
Question
When creating an argument within a rule, which is an example of a noun token?
Answer
-
Map
-
Join
-
Class Name
-
Lowercase
-
Escape Source DN
Question 42
Question
Which types of tokens are in the Argument Builder? (Choose 2.)
Answer
-
Verb
-
Noun
-
Action
-
Change
-
Attribute
-
Placement
-
Replacement
Question 43
Question
What are benefits of using Policy Builder? (Choose 2.)
Answer
-
It is built on open standards.
-
It enforces password complexity.
-
It is a GUI with command line capabilities.
-
It minimizes the need for XLST stylesheets.
-
It provides a graphical interface to help data cleansing.
-
It provides a graphical interface for rapid development of policies.
Question 44
Question
What is a purpose of the DAL (Directory Abstraction Layer)?
Answer
-
To process work flows
-
To grant/revoke entitlements
-
To store entities attribute data for use in work flows
-
To provide a customized view of objects and their attributes that are stored in the Identity Vault
Question 45
Question
Which options might you find in a Role Membership? (Choose 2.)
Answer
-
End Date
-
Start Date
-
Proxy User
-
Workflow Status
-
Separation of Duties
Question 46
Question
Which User Application configuration object contains Provisioning Request Definitions?
Answer
-
AppDefs
-
ServiceDefs
-
RequestDefs
-
ResourceDefs
-
WorkFlowDefs
Question 47
Question
Which aspects of the User Application can be controlled by customizing the themes in the User
Application?
Answer
-
Modifying the HTML layouts for individual portlets.
-
Assigning different themes to different users upon login to the User Application.
-
Changing the colors and logos used by the User Application pages, headers, footers and tabs.
-
Restricting the pages and tabs that are available to a particular user upon login to the User
Application.
Question 48
Question
Which allows you to delete, activate, inactivate and retire existing provisioning request definitions?
Answer
-
User Application Driver
-
User Application Portlets
-
Workflow Administration plug-in
-
Provisioning Request Configuration plug-in
Question 49
Question
The User Application Security Model uses domains to create sets of configurations and
permissions that can be assigned to different user types. Under the Provisioning domain, which
permission allows the user to retract selected provisioning requests when they are in progress?
Answer
-
Retract PRD
-
Initiate PRD
-
Configure Delegate
-
View Running PRD
-
Configure Availability
Question 50
Question
The Requests & Approvals tab in the Identity Manager user application includes a group of actions
called My Settings. The My Settings actions give you the ability to view your proxy and delegate
assignments. What is the difference between a proxy and a delegate?
Answer
-
A delegate assignment is independent of process requests.
-
A delegate assignment applies to a particular type of request.
-
A delegate assignment can only be given to a Team Manager.
-
A Provisioning Manager can only define delegate assignments
-
A delegate assignment can only be given to a Provisioning Manager.
Question 51
Question
The Roles hierarchy supports three levels. Which represents the highest role level?
Answer
-
Kaiser Role
-
Business Role
-
Resource Role
-
Technical Role
-
Workflow Role
Question 52
Question
Which System Role allows members to create, remove, or modify SoD constraints?
Question 53
Question
Which statement is true regarding role relationships?
Answer
-
Roles cannot contain other roles.
-
Mid-level roles can contain lower-level and higher-level roles.
-
Bottom-level roles can be contained by higher-level roles and other bottom-level roles.
-
Top-level roles can contain lower-level roles, but they cannot be contained by other roles.
Question 54
Question
What role does NMAS play in synchronizing passwords in an Identity Manager solution?
Answer
-
NMAS controls the flow of synchronizing passwords within Identity Vault.
-
NMAS controls the flow of password synchronization in a connected system, based on NMAS
driver settings.
-
NMAS prevents legacy utilities that are not Universal Password-enabled from updating an NDS
password directly.
-
NMAS controls the flow of password synchronization, and prevents legacy utilities that are not
Universal Password-enabled from updating a password directly.
-
NMAS controls the flow of password synchronization in a connected system, and prevents
legacy utilities that are not Universal Password-enabled from updating an NDS password directly.
Question 55
Question
Only one policy is effective for a user at a time. Novell Modular Authentication Services (NMAS)
determines which policy is effective for a user by looking for policies in the following order and
applying the first one it finds. In which order does NMAS look for password policies?
Answer
-
1) Partition root container
2) Container
3) Specific user assignment
4) Login Policy Object
-
1) Specific user assignment
2) Login Policy Object
3) Partition root container
4) Container
-
1) Login Policy Object
2) Specific user assignment
3) Container
4) Partition root container
-
1) Specific user assignment
2) Container
3) Partition root container
4) Login Policy Object
-
1) Login Policy Object
2) Partition root container
3) Container
4) Specific user assignment
Question 56
Question
Which are advantages of using NDS password to synchronize passwords between two Identity
Vaults? (Choose 2.)
Answer
-
Simple configuration.
-
Universal and Distribution password updates
-
E-mail notifications for password synchronization failures
-
Enforcement of the basic password restrictions you can set for NDS Password
-
Password reset on the connected Identity Vault if the passwords don't comply with NMAS
password policy
Question 57
Question
Which allows you to change Universal Password in eDirectory? (Choose 2.)
Answer
-
iFilter
-
Designer
-
iManager
-
NWAdmin
-
IDM User Application
Question 58
Question
Which Identity Manager reporting component retrieves the data needed for report generation from
the Identity Information Warehouse?
Question 59
Question
Which report cannot be deleted and should not be run by itself?
Answer
-
Template
-
Identity Vault User Report
-
Identity Vault Driver Associations Report
-
Correlated Resource Assignment Events by User
Question 60
Question
What does the Calendar page of the Reporting Module show? (Choose 2.)
Answer
-
Report size
-
Report settings
-
Deleted reports
-
Finished reports
-
Reports that failed
Question 61
Question
Which statement is true regarding the token timeout strategy that is implemented by the Identity
Reporting Module?
Answer
-
The token associated with each user login times out automatically after a specific period of idle
time.
-
The token associated with each user login times out automatically after each event that affects
the user object.
-
The token associated with each user login times out automatically after a specific period of
time, after the user logs out.
-
The token associated with each user login times out automatically after a specific period of
time, regardless of what the user does.
Question 62
Question
Which Identity Manager component allows your organization to assure that user access to
resources does not break any corporate or government regulations?
Answer
-
Workflow
-
Attestation
-
Self Service
-
Data Synchronizing
-
Auditing and Reporting
Question 63
Question
When using Designer, what option allows you to manage and view the file resources that are in
your workspace?
Answer
-
Outline View
-
Project View
-
Dataflow View
-
Properties View
-
Navigation View
Question 64
Question
When using Designer, what option allows you to modify projects or other items that are listed in
the Navigator or Project view?
Answer
-
Views
-
Editors
-
Builders
-
Wizards
Question 65
Question
Which contains the components of Identity Manager drivers organized according to the
functionality you want to provide to a driver?
Question 66
Question
Which statement is true regarding creating packages?
Answer
-
Packages can be created using Designer or iManager.
-
Packages must be created before a Driver can function.
-
Packages can only be created for Drivers and Driver Sets.
-
Packages can only be created in environments that have IDM 3.0 or later.
-
Packages can only be created when the Identity Vault is in development mode.
Question 67
Question
You are trying to add content to a package. You have created content in an item. You right-click
that item and select Add to Package; however, no packages are showing in the list. What is the
cause of this problem?
Answer
-
You must build a package before you can add content to it.
-
You must version a package before you can add content to it.
-
You must create a package in Designer before you can add content to it.
-
You must import a package into Designer before you can add content to it.
Question 68
Question
Which packages can be published?
Answer
-
Packages that have been built
-
Packages that have been created
-
Packages that have been imported
-
Packages that have been localized
Question 69
Question
When installing the Active Directory Driver, which options can you choose when selecting the
desired form for the placement of new objects? (Choose 2.)
Question 70
Question
Which entitlement agent is ideal for simple automation?
Question 71
Question
Which statement about entitlements is true?
Answer
-
Entitlements are used as the association key for the user objects.
-
eDirectory schema is extended the first time Entitlements are invoked.
-
The DirXML-EntitlementRef attribute keeps track of the entitlements that a user has been
granted or revoked.
-
Entitlements that grant or revoke Group Membership will always take precedence over policies
that grant or revoke Group Memberships.
Question 72
Question
Which statement is true when creating your own Entitlements?
Answer
-
You create Entitlements using iMonitor.
-
You can only create Entitlements on the Publisher channel.
-
You must add the Entitlements to a driver set for them to work.
-
You must add a policy to the driver for the Entitlements to work.
Question 73
Question
Which domain defines rights to launch attestation requests and view the status of attestation
requests?
Answer
-
Role Domain
-
Resource Domain
-
Compliance Domain
-
Provisioning Domain
-
Configuration Domain
Question 74
Question
For which domains is it not possible to create Domain Managers? (Choose 3.)
Answer
-
Role
-
Resource
-
Security
-
Compliance
-
Configuration
Question 75
Question
Which users have access to the team configuration page? (Choose 2.)
Answer
-
Role Manager
-
Team Manager
-
Security Administrator
-
Resource Manager
-
Provisioning Manager
Question 76
Question
Which of the following can create teams? (Choose 3.)
Answer
-
Team Manager
-
Role Administrator
-
Security Administrator
-
Provisioning Manager
-
Resource Administrator
-
Compliance Administrator
Question 77
Question
In the Navigation Access Permissions page, who has access to the administration tab? (Choose
2.)
Question 78
Question
At runtime, which performs all of the User Application’s LDAP queries against the Identity Vault?
Answer
-
The publisher filter
-
The Role Catalogue
-
The Abstraction Layer Protocol
-
User Application Administration
-
The Directory Abstraction Layer
Question 79
Question
Which defines the Provisioning request categories the user application can display?
Question 80
Question
In which of the following is the directory abstraction layer editor plug-in available?
Question 81
Question
Which is used to define Directory Abstraction Layer definitions?
Answer
-
Filter Editor
-
Policy Editor
-
Integration Activity Editor
-
Directory Abstraction Layer Editor
-
Provisioning Request Definition Editor
Question 82
Question
Which do you use to create and deploy provisioning requests to the User Application driver?
Question 83
Question
Which are directory objects that encapsulate the business rules for granting or revoking a
corporate resource or role, and binding the corporate resource or role to a workflow?
Answer
-
Role Mapping Definitions
-
Provisioning Request Definitions
-
Data Abstraction Layer Definitions
-
Global Configuration Values Definitions
Question 84
Question
When adding a control to a form that is being created, Designer adds a control-named Field to the
bottom line of the form. Where is the name that is entered into this field used? (Choose 3.)
Answer
-
The ECMA expression builder dialog box
-
The Create Resource Wizard’s General tab
-
The Workflow tab’s Data Item Mapping dialog box
-
In the Role Mapping Administration Authorization panel
-
An internal XML reference in the provisioning request definition file
Question 85
Question
Which statements are true regarding workflows? (Choose 3.)
Answer
-
An activity represents a task.
-
A process consists of activities and flow paths.
-
A flow path ties activities in a workflow together.
-
An activity represents the work to be processed.
-
An activity can have only one incoming and one outgoing flow path.
Question 86
Question
Which rules need to be followed when adding activities to a workflow? (Choose 3.)
Answer
-
A workflow cannot contain a condition activity.
-
Each Approval activity must have a Condition activity.
-
Each Branch activity must have a corresponding Merge activity.
-
Each workflow must have at least one Entitlement or Entity activity.
-
Each workflow must have only one Start activity and only one Finish activity.
Question 87
Question
Which rules need to be followed when adding flow paths to a workflow? (Choose 3.)
Answer
-
There can be multiple flow paths out of the Start activity.
-
There can be only one flow path out of the Merge activity.
-
There can be only one flow path out of the Branch activity.
-
There can be only one flow path out of the Entitlement activity.
-
There can be between one and five flow paths out of the Approval activity.
Question 88
Question
The Integration activity automatically creates an action model for working with a Web service
based on which document format?
Question 89
Question
In the Standard SoD Constraint Exception Approval Workflow Activity, which Activity Name determines whether the approval is a quorum condition?
Answer
-
Localize SoD Name
-
Approve SoD Conflict
-
Check for Processing Type
-
Approve SoD Conflict (Serial)
-
Approve SoD Conflict (Quorum)
Question 90
Question
Which statement is true regarding the Novell Identity Manager Role Mapping Administrator?
Answer
-
If you have both Role Manager and Resource Manager roles, you can create, edit, and delete
mappings.
-
If you have both Role Manager and Resource Administrator roles, you can create, edit, and
delete mappings.
-
If you have both Role Administrator and Resource Manager roles, you can create, edit, and
delete mappings.
-
If you have both Role Administrator and Resource Administrator roles, you can create, edit, and
delete mappings.
Question 91
Question
Within the Role Mapping Administrator, which displays the roles that you are authorized to
manage?
Question 92
Question
Which application is used to map authorizations to Identity Vault Roles?
Question 93
Question
Using regular expressions, which will the following expression match? (Choose 2.)
of*
Answer
-
of
-
off
-
often
-
offset
-
offers
Question 94
Question
Using regular expressions, which matches ‘a’ or ‘b’?
Answer
-
“a\b”
-
“a.b”
-
“a*b”
-
“a|b”
-
“a:b”
Question 95
Question
Using regular expressions, which phone number should the following match?
.*[89]00.*[0-9]{3}.*[0-9]{4}
Answer
-
800-123-4567
-
901-123-4567
-
701-123-4567
-
808-123-4567
-
809-123-4567
Question 96
Question
What version of the W3C XPATH Recommendation does Identity Manager use?
Question 97
Question
Which XPATH operator is used to select all descendent nodes at any depth below the current
stated node?
Question 98
Question
If there is a name conflict between different variable sources in an XPATH statement, what is the
order of precedence?
Answer
-
Local (policy scope), Global, Local (driver scope)
-
Global, Local (driver scope), Local (policy scope)
-
Local (driver scope), Local (policy scope), Global
-
Global, Local (policy scope), Local (driver scope)
-
Local (policy scope), Local (driver scope), and global
Question 99
Question
Which are some best practices for using version control with Designer? (Choose 2.)
Answer
-
Use the Tortoise Subversion client.
-
Use the Subversion command line when possible.
-
Enable Subclipse before using version control with Designer.
-
Assign one person to deploy a project to a production environment.
-
Assign one team member to a policy rather than having multiple team members work on one
policy.
Question 100
Question
The following options are found within the forms tab of the Provisioning Request Definition Editor:
Form Selection
Fields tab
Actions tab
Events tab
Scripts tab
Which option allows you to add, delete, and change the data type, control type, and layout order of
the controls on the form?
Answer
-
Fields tab
-
Events tab
-
Scripts tab
-
Actions tab
-
Form Selection
Question 101
Question
Which default URL is used to access the iManager web application at 192.168.1.1?
Answer
-
http://192.168.1.1/
-
http://192.168.1.1/nps/iManager.html
-
https://192.168.1.1/nps/iManager.html
-
https://192.168.1.1:8443/iManager.html
-
https://192.168.1.1:8443/nps/iManager.html
Question 102
Question
Which statements are true regarding Designer? (Choose 2.)
Answer
-
Designer allows you to test policies off-line.
-
Designer allows you to perform any task on the live system.
-
Designer allows you to test and deploy solutions to production or test environments.
-
Designer does not allow existing solutions to be imported from the network into Designer.
Question 103
Question
When using Designer, what you can import at the Driver level?
Answer
-
Policies only
-
Channels and policies only
-
Driver sets and drivers only
-
A project from an Identity Vault
-
Driver sets, drivers, channels, and policies only
Question 104
Question
What is the naming convention for a Global Configuration Value (GCV)?
Answer
-
<name>.<group>.[<subgroup>.][<purpose/scope>]
-
<group>.[<subgroup>.][<purpose/scope>.]<name>
-
<group>.[<subgroup>.]<name>.[<purpose/scope>]
-
[<purpose/scope>.]<group>.[<subgroup>.]<name>
-
<name>.[<purpose/scope>.][<subgroup>.]<group>
Question 105
Question
You want to see password synchronization information when running a trace. What is the
minimum trace level that will provide this information?
Answer
-
Level 0
-
Level 1
-
Level 2
-
Level 3
-
Level 4
-
Level 5
Question 106
Question
Which statements are true when using Global Configuration Values (GCVs)? (Choose 2.)
Answer
-
GCVs can only be set on the Driver Set.
-
If you set GCVs on the Driver Set object, those values cannot be inherited by a driver.
-
If you set GCVs on the Driver Set object, those values are inherited by a driver and replace any
existing values.
-
If a driver has no settings of its own and inherits the GCVs from the driver set, iManager does
not display them.
-
If you set GCVs on the Driver Set object, those values are inherited by a driver in that driver set
if the driver does not have values of its own.
Question 107
Question
What eDirectory entities can Password Policies be assigned to? (Choose 3.)
Answer
-
Roles
-
Users
-
Groups
-
Partition Root Object
-
Login Policy Object
Question 108
Question
Which statements are true about Provisioning Request Definitions? (Choose 2.)
Answer
-
They are used to launch attestation workflows.
-
They are used to grant or revoke corporate roles.
-
They are used to provide policy rules.
-
They are used to filter requests at the driver level.
-
They are used to define Global Configuration Values.
Question 109
Question
Which is most commonly used to access ECMAScript?
Question 110
Question
The Roles Based Provisioning Module includes a read-only Role Approval workflow. Which option
does this Role Approval workflow support? (Choose 2.)
Answer
-
The ability to display the role using localized display names
-
The ability to process SoD conflicts in either serial or quorum mode
-
The ability to process role approvals in either serial or quorum mode
-
The retrieval of SoD approver DNs from the request object (nrfRequest)
-
E-mail notification to all approvers per SoD conflict found for SoD workflow approvals
Question 111
Question
When using the Role Mapping Administrator to create a new role, you will need to select a level for
the role. Which level defines lower-level privileges?
Answer
-
IT Role
-
Mapping Role
-
Systems Role
-
Business Role
-
Permission Role
Question 112
Question
Given the XML Document below:
<nds dtdversion="3.5" ndsversion="8.x">
<source>
<product version="3.5.10.20070918 ">DirXML</product>
<contact>Novell, Inc.</contact>
</source>
<input>
<add class-name="User" qualified-src-dn="O=DA\OU=USERS\CN=E123456" src-dn="\DA-
TREE\DA\USERS\E123456" src-entry-id="34042" from-merge="true">
<add-attr attr-name="Facsimile Telephone Number">
<value type="structured">
<component name="faxNumber">801-555-1212</component>
<component name="faxBitCount">0</component>
<component name="faxParameters"/>
</value>
</add-attr>
<add-attr attr-name="Full Name">
<value type="string">Frank Jones</value>
</add-attr>
<add-attr attr-name="Given Name">
<value type="string">Frank</value>
</add-attr>
<add-attr attr-name="Internet EMail Address">
<value type="string">Frank.Jones@da.org</value>
</add-attr>
<add-attr attr-name="Surname">
<value type="string">Jones</value>
</add-attr>
</add>
</input>
</nds>
Within the Policy Builder Rule Conditions, what value will the XPATH Statement "@from-
merge='true'" return?
Answer
-
null
-
true
-
false
-
error
-
success
Question 113
Question
In which order does the metadirectory engine apply policies?
Answer
-
1) Matching policy 2) Placement policy 3) Creation policy
-
1) Matching policy 2) Creation policy 3) Placement policy
-
1) Creation policy 2) Placement policy 3) Matching policy
-
1) Creation policy 2) Matching policy 3) Placement policy
-
1) Placement policy 2) Creation policy 3) Matching policy
-
1) Placement policy 2) Matching policy 3) Creation policy
Question 114
Question
Which statement is true regarding the output that DSTrace generates?
Answer
-
Each policy can have only one rule.
-
Each rule is processed multiple times per event.
-
Rules will only be executed if their condition logic evaluates to be true.
-
IDM engine trace levels 0 through 3 show policies as they are being applied.
Question 115
Question
Which connected systems support bidirectional password synchronization? (Choose 3.)
Question 116
Question
Which user type works with the User Application’s Identity Self-Service, Work Dashboard, and
Roles and Resource tabs and has no administrative permissions?
Answer
-
Designers
-
Team Manager
-
Business Users
-
Domain Manager
Question 117
Question
Which statement is true regarding regular expressions?