Jede Frage dieses Quiz ist zeitlich begrenzt. Drücke auf die Schaltfläche um das Quiz zu starten.
When data changes in the Identity Vault or a connected application, which processes the changes?
Drivers
Remote Loader
Identity Vault
Metadirectory Engine
Connected application
Which statement is true?
When an event occurs in the Identity Vault, Identity Manager creates an XML document that describes the Identity Vault event and submits it through the Publisher channel to a driver shim.
When an event occurs in the Identity Vault, Identity Manager creates an XML document that describes the Identity Vault event and submits it through the Subscriber channel to a driver shim.
When an event occurs in a connected system, Identity Manager creates an XML document that describes the Identity Vault event and submits it through the Subscriber channel to a driver shim.
When an event occurs in the Identity Vault, a driver shim creates an XML document that describes the Identity Vault event and submits it through the Subscriber channel to Identity Manager.
When an event occurs in a connected system, a Driver Shim creates an XML document that describes the Identity Vault event and submits it through the Subscriber channel to Identity Manager.
Which statements are true? (Choose 2.)
When an event is being sent to a driver, it is a notification.
When an event is being sent to a driver, it is a command.
When an event is being sent to Identity Manager, it is a command.
When an event is being sent to Identity Manager, it is a notification.
Events and commands are handled the same way within an IDM 4 environment.
What does a Driver object contain? (Choose 2.)
Packages
Driver Set
Policy Objects
Application driver shim
Subscriber and Publisher objects
Identity Manager uses a MetaDirectory Engine to process Identity Vault data and events. What component assures changes in the Identity Vault are not lost if a connected system goes offline?
Partition
Obit flag
Change Log
Event Cache
An Identity Manager Job can only interact with which driver channel?
Input
Sender
Output
Receiver
Publisher
Placement
Subscriber
Which installation mode is supported by the integrated installer?
Silent mode
Non-root mode
Console mode
AutoYaST mode
Standalone mode
Which statements about the Integrated Installer are true? (Choose 2.)
It automatically handles dependencies
It automatically installs all of the drivers
The iManager plug-in needs to be manually installed
It exists only for the Windows operating system family
Which task within Novell iManager allows administrators to view all objects that are associated with a particular Novell IDM driver?
Object Inspector
Driver Inspector
DriverSet Inspector
Driver Cache Inspector
What is the minimum RAM system requirement for Designer?
128 MB
256 MB
512 MB
1024 MB
2048 MB
When using Designer, which modeling mode is used to do all low-level operations with driver sets, drivers, policies and applications?
Table Mode
System Mode
DataFlow Mode
Architect Mode
Developer Mode
Which view enables you to view the filters that allow the data to flow between all of the systems and the Identity Vaults as well as view how passwords flow through the different systems?
Project view
Outline view
Dataflow view
Navigator view
Policy Set view
When using Designer, a perspective is a collection of related views and editors. Which perspective should be open the first time you run the application?
Debug perspective
Designer perspective
Java/Java Browsing perspective
Java Type Hierarchy perspective
Plug-in Development perspective
Which view do you use to access Policy Simulator? (Choose 2.)
The Tasks view
The Outline view
The Project view
The Navigator view
The Policy Flow view
When you start Designer for the first time or start Designer without a project listed, which should you first do?
Make sure that the Debug perspective is selected.
Make sure that the Plug-in perspective is selected.
Make sure that the Designer perspective is selected.
Make sure that the Java/Java Browsing perspective is selected.
Make sure that the Java Type Hierarchy perspective is selected.
When using Designer, which view do you use to import driver sets, drivers, and channels from the file system?
When checking in a project to a Version Control Server, you will need to specify a file path to your Subversion server or a URL to the Subversion server. If you specify a URL, which protocols are supported? (Choose 4.)
FTP
NFS
SVN
HTTP
SFTP
HTTPS
SVN + SSH
When is the package catalog created?
When a package is installed
When a driver object is created
When a Driver Set object is created
When a project is created or imported
Which statement is true regarding packages?
You can downgrade any package that has been upgraded.
You can delete packages from the package catalog at anytime.
You can only upgrade packages that have been added to drivers.
Before you can import packages into the package catalog, you must install them.
When you install Active Directory drivers, you must choose an authentication method. Authentication identifies the driver shim to Active Directory and, potentially, to the local machine. Which statements are true regarding the Negotiate authentication method? (Choose 2.)
This is the preferred authentication method.
This can be installed on a server that is not a member of the domain.
This uses Kerberos, NTLM, or a pluggable authentication scheme if one is installed.
This is used when the server hosting the driver shim is not a member of the domain.
When using this, some provisioning services, such as Exchange mailbox provisioning and password synchronization, are unavailable
If you map the eDirectory attribute of Login Expiration Time to the Active Directory attribute of accountExpires, when does the account in Active Directory expire?
A day later than the time set in eDirectory
A day earlier than the time set in eDirectory
An hour later than the time set in eDirectory
At the same time as the time set in eDirectory
An hour earlier than the time set in eDirectory
Which method can be used to start the process of installing Active Directory driver packages?
In the Modeler, right-click the driver set where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.
In the Modeler, right-click the Identity Vault where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.
In the Modeler, right-click the server where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.
In the Modeler, right-click the application where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.
In the Modeler, right-click the package catalog where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.
When installing Active Directory driver packages, you can also install optional features for the Active Directory driver. Which feature should you select if you are using the Identity Reporting Module?
Data Collection
Account Tracking
Default Configuration
Password Synchronization
Entitlements and Exchange Mailbox Support
In which order should you create and start an Active Directory driver?
Import the current driver packages 2) Install the driver packages 3) Deploy the driver 4) Configure the driver 5) Start the driver
1) Install the driver packages 2) Import the current driver packages 3) Deploy the driver 4) Configure the driver 5) Start the driver
1) Install the driver packages 2) Import the current driver packages 3) Deploy the driver 4) Start the driver 5) Configure the driver
1) Import the current driver packages 2) Install the driver packages 3) Configure the driver 4) Deploy the driver 5) Start the driver
1) Import the current driver packages 2) Install the driver packages 3) Deploy the driver 4) Start the driver 5) Configure the driver
When installing the Active Directory Driver, which options are available when you are selecting the desired form for the placement of new objects? (Choose 2.)
Flat
Level
Parallel
Mirrored
Structured
Bi-directional
Single Organizational Unit
In an Active Directory environment, which tools enable you to view and manage the associations between drivers and objects? (Choose 2.)
Designer
Policy Simulator
Active Directory Discovery tool
Which allows you to securely store multiple passwords for a driver?
Named Passwords
Universal Password
Password Policy object
Event Auditing Service
To which can you add Named Passwords? (Choose 2.)
Server
Driver Sets
Applications
Identity Vaults
You have noticed that a server is not listed in the Servers tab on the driver or driver set. Which may resolve this issue?
Revert back to an older driver.
Revert back to an older driver set.
Delete the problem driver and reinstall it.
Delete the related driver set and then reinstall it.
Disassociate the driver set object and the server and then re-associate them.
Which statements are true regarding Global Configuration Values (GCVs)? (Choose 2.)
GCVs are variables.
GCVs are constant values.
GCVs can be changed at runtime.
GCVs are accessible to the tree and network.
GCVs are globally accessible to the driver and driver set.
Which correctly shows the precedence of Global Configuration Values (GCVs)?
1) GCVs from the driver set Global Configuration list 2) GCVs from the driver Global Configuration list 3) GCVs from the driver 4) GCVs from the driver set
1) GCVs from the driver set Global Configuration list 2) GCVs from the driver Global Configuration list 3) GCVs from the driver set 4) GCVs from the driver
1) GCVs from the driver 2) GCVs from the driver set 3) GCVs from the driver Global Configuration list 4)GCVs from the driver set Global Configuration list
1) GCVs from the driver 2)GCVs from the driver Global Configuration list 3) GCVs from the driver set 4)GCVs from the driver set Global Configuration list
Which drivers have Remote Loader capability? (Choose 3.)
JDBC
LDAP
eDirectory
Active Directory
Entitlement Services
Which pre-defined jobs operate at the driver set level? (Choose 2.)
Driver Health
Schedule Driver
Subscriber Channel Trigger
Random Password Generator
Password Expiration Notification
What type of Identity Manager Event does a Subscriber Trigger Event Job create?
sync
query
modify
status
trigger
triggerless
Using iManager, what do you need to select to allow you to see the Filter icons so that you can edit filters?
The Driver
The Driver Set
The Application
The Identity Vault
Which statements about filters are true? (Choose 2.)
You cannot export a filter from a driver.
You can configure a filter policy for a driver set.
You can add a class or attribute to a filter policy.
There are separate filter policies for the Publisher and the Subscriber channels.
The same filter policy is used for both the Publisher and the Subscriber channels.
Which policy primarily handles the conversion of data formats from data that the Metadirectory engine provides to data that the application shim expects?
Creation policy
Matching policy
Placement policy
Input Transformation policy
Event Transformation policy
Output Transformation policy
When an XML document has an input tag type, which are supported inputs? (Choose 4.)
<add>
<copy>
<find>
<delete>
<format>
<modify>
<rename>
What is wrong with this add event? <nds> <input> <add class-name="" event-id="idv-jdbc-staff#Publisher#696" qualified-src-dn="O=vault\OU=employees\CN=overtestra" src-dn="\IDVVAULT\vault\employees\overtestra" src-entry-id="136443"> <association state="pending"></association> <add-attr attr-name="CN"> <value naming="true" timestamp="1206986293#34" type="string">overtestra</value> </add-attr> </add> </input> </nds>
The Class name is missing.
The timestamp is incorrect
The association state is pending.
The src-dn is improperly formatted.
Which Policy Sets are applied only during an add event?
Matching, Create, and Placement
Input Transformation, Matching, and Create
Matching, Create, and Schema Transformation
Input Transformation, Schema Transformation, and Command Transformation
When creating an argument within a rule, which is an example of a noun token?
Map
Join
Class Name
Lowercase
Escape Source DN
Which types of tokens are in the Argument Builder? (Choose 2.)
Verb
Noun
Action
Change
Attribute
Replacement
What are benefits of using Policy Builder? (Choose 2.)
It is built on open standards.
It enforces password complexity.
It is a GUI with command line capabilities.
It minimizes the need for XLST stylesheets.
It provides a graphical interface to help data cleansing.
It provides a graphical interface for rapid development of policies.
What is a purpose of the DAL (Directory Abstraction Layer)?
To process work flows
To grant/revoke entitlements
To store entities attribute data for use in work flows
To provide a customized view of objects and their attributes that are stored in the Identity Vault
Which options might you find in a Role Membership? (Choose 2.)
End Date
Start Date
Proxy User
Workflow Status
Separation of Duties
Which User Application configuration object contains Provisioning Request Definitions?
AppDefs
ServiceDefs
RequestDefs
ResourceDefs
WorkFlowDefs
Which aspects of the User Application can be controlled by customizing the themes in the User Application?
Modifying the HTML layouts for individual portlets.
Assigning different themes to different users upon login to the User Application.
Changing the colors and logos used by the User Application pages, headers, footers and tabs.
Restricting the pages and tabs that are available to a particular user upon login to the User Application.
Which allows you to delete, activate, inactivate and retire existing provisioning request definitions?
User Application Driver
User Application Portlets
Workflow Administration plug-in
Provisioning Request Configuration plug-in
The User Application Security Model uses domains to create sets of configurations and permissions that can be assigned to different user types. Under the Provisioning domain, which permission allows the user to retract selected provisioning requests when they are in progress?
Retract PRD
Initiate PRD
Configure Delegate
View Running PRD
Configure Availability
The Requests & Approvals tab in the Identity Manager user application includes a group of actions called My Settings. The My Settings actions give you the ability to view your proxy and delegate assignments. What is the difference between a proxy and a delegate?
A delegate assignment is independent of process requests.
A delegate assignment applies to a particular type of request.
A delegate assignment can only be given to a Team Manager.
A Provisioning Manager can only define delegate assignments
A delegate assignment can only be given to a Provisioning Manager.
The Roles hierarchy supports three levels. Which represents the highest role level?
Kaiser Role
Business Role
Resource Role
Technical Role
Workflow Role
Which System Role allows members to create, remove, or modify SoD constraints?
Role Auditor
Role Manager
Security Officer
Provisioning Administrator
User Application Administrator
Which statement is true regarding role relationships?
Roles cannot contain other roles.
Mid-level roles can contain lower-level and higher-level roles.
Bottom-level roles can be contained by higher-level roles and other bottom-level roles.
Top-level roles can contain lower-level roles, but they cannot be contained by other roles.
What role does NMAS play in synchronizing passwords in an Identity Manager solution?
NMAS controls the flow of synchronizing passwords within Identity Vault.
NMAS controls the flow of password synchronization in a connected system, based on NMAS driver settings.
NMAS prevents legacy utilities that are not Universal Password-enabled from updating an NDS password directly.
NMAS controls the flow of password synchronization, and prevents legacy utilities that are not Universal Password-enabled from updating a password directly.
NMAS controls the flow of password synchronization in a connected system, and prevents legacy utilities that are not Universal Password-enabled from updating an NDS password directly.
Only one policy is effective for a user at a time. Novell Modular Authentication Services (NMAS) determines which policy is effective for a user by looking for policies in the following order and applying the first one it finds. In which order does NMAS look for password policies?
1) Partition root container 2) Container 3) Specific user assignment 4) Login Policy Object
1) Specific user assignment 2) Login Policy Object 3) Partition root container 4) Container
1) Login Policy Object 2) Specific user assignment 3) Container 4) Partition root container
1) Specific user assignment 2) Container 3) Partition root container 4) Login Policy Object
1) Login Policy Object 2) Partition root container 3) Container 4) Specific user assignment
Which are advantages of using NDS password to synchronize passwords between two Identity Vaults? (Choose 2.)
Simple configuration.
Universal and Distribution password updates
E-mail notifications for password synchronization failures
Enforcement of the basic password restrictions you can set for NDS Password
Password reset on the connected Identity Vault if the passwords don't comply with NMAS password policy
Which allows you to change Universal Password in eDirectory? (Choose 2.)
iFilter
iManager
NWAdmin
IDM User Application
Which Identity Manager reporting component retrieves the data needed for report generation from the Identity Information Warehouse?
Reporting Service
Report Packaging Tool
Data Collection Service
Identity Vault Data Sources
Data Collection Service Driver
Which report cannot be deleted and should not be run by itself?
Template
Identity Vault User Report
Identity Vault Driver Associations Report
Correlated Resource Assignment Events by User
What does the Calendar page of the Reporting Module show? (Choose 2.)
Report size
Report settings
Deleted reports
Finished reports
Reports that failed
Which statement is true regarding the token timeout strategy that is implemented by the Identity Reporting Module?
The token associated with each user login times out automatically after a specific period of idle time.
The token associated with each user login times out automatically after each event that affects the user object.
The token associated with each user login times out automatically after a specific period of time, after the user logs out.
The token associated with each user login times out automatically after a specific period of time, regardless of what the user does.
Which Identity Manager component allows your organization to assure that user access to resources does not break any corporate or government regulations?
Workflow
Attestation
Self Service
Data Synchronizing
Auditing and Reporting
When using Designer, what option allows you to manage and view the file resources that are in your workspace?
Outline View
Project View
Dataflow View
Properties View
Navigation View
When using Designer, what option allows you to modify projects or other items that are listed in the Navigator or Project view?
Views
Editors
Builders
Wizards
Which contains the components of Identity Manager drivers organized according to the functionality you want to provide to a driver?
Entitlements
User Application
Roles Based Provisioning Module
Which statement is true regarding creating packages?
Packages can be created using Designer or iManager.
Packages must be created before a Driver can function.
Packages can only be created for Drivers and Driver Sets.
Packages can only be created in environments that have IDM 3.0 or later.
Packages can only be created when the Identity Vault is in development mode.
You are trying to add content to a package. You have created content in an item. You right-click that item and select Add to Package; however, no packages are showing in the list. What is the cause of this problem?
You must build a package before you can add content to it.
You must version a package before you can add content to it.
You must create a package in Designer before you can add content to it.
You must import a package into Designer before you can add content to it.
Which packages can be published?
Packages that have been built
Packages that have been created
Packages that have been imported
Packages that have been localized
When installing the Active Directory Driver, which options can you choose when selecting the desired form for the placement of new objects? (Choose 2.)
Which entitlement agent is ideal for simple automation?
DIRXML-EntitlementRef
Role-Based Entitlement
Roles-Based Provisioning Module
Which statement about entitlements is true?
Entitlements are used as the association key for the user objects.
eDirectory schema is extended the first time Entitlements are invoked.
The DirXML-EntitlementRef attribute keeps track of the entitlements that a user has been granted or revoked.
Entitlements that grant or revoke Group Membership will always take precedence over policies that grant or revoke Group Memberships.
Which statement is true when creating your own Entitlements?
You create Entitlements using iMonitor.
You can only create Entitlements on the Publisher channel.
You must add the Entitlements to a driver set for them to work.
You must add a policy to the driver for the Entitlements to work.
Which domain defines rights to launch attestation requests and view the status of attestation requests?
Role Domain
Resource Domain
Compliance Domain
Provisioning Domain
Configuration Domain
For which domains is it not possible to create Domain Managers? (Choose 3.)
Role
Resource
Security
Compliance
Configuration
Which users have access to the team configuration page? (Choose 2.)
Team Manager
Security Administrator
Resource Manager
Provisioning Manager
Which of the following can create teams? (Choose 3.)
Role Administrator
Resource Administrator
Compliance Administrator
In the Navigation Access Permissions page, who has access to the administration tab? (Choose 2.)
Configuration Administrator
At runtime, which performs all of the User Application’s LDAP queries against the Identity Vault?
The publisher filter
The Role Catalogue
The Abstraction Layer Protocol
User Application Administration
The Directory Abstraction Layer
Which defines the Provisioning request categories the user application can display?
Driver Filter
Role Catalog
Package Catalog
Global Configuration Values
In which of the following is the directory abstraction layer editor plug-in available?
iMonitor
Role Mapping Administrator
Which is used to define Directory Abstraction Layer definitions?
Filter Editor
Policy Editor
Integration Activity Editor
Directory Abstraction Layer Editor
Provisioning Request Definition Editor
Which do you use to create and deploy provisioning requests to the User Application driver?
User Application Editor
Which are directory objects that encapsulate the business rules for granting or revoking a corporate resource or role, and binding the corporate resource or role to a workflow?
Role Mapping Definitions
Provisioning Request Definitions
Data Abstraction Layer Definitions
Global Configuration Values Definitions
When adding a control to a form that is being created, Designer adds a control-named Field to the bottom line of the form. Where is the name that is entered into this field used? (Choose 3.)
The ECMA expression builder dialog box
The Create Resource Wizard’s General tab
The Workflow tab’s Data Item Mapping dialog box
In the Role Mapping Administration Authorization panel
An internal XML reference in the provisioning request definition file
Which statements are true regarding workflows? (Choose 3.)
An activity represents a task.
A process consists of activities and flow paths.
A flow path ties activities in a workflow together.
An activity represents the work to be processed.
An activity can have only one incoming and one outgoing flow path.
Which rules need to be followed when adding activities to a workflow? (Choose 3.)
A workflow cannot contain a condition activity.
Each Approval activity must have a Condition activity.
Each Branch activity must have a corresponding Merge activity.
Each workflow must have at least one Entitlement or Entity activity.
Each workflow must have only one Start activity and only one Finish activity.
Which rules need to be followed when adding flow paths to a workflow? (Choose 3.)
There can be multiple flow paths out of the Start activity.
There can be only one flow path out of the Merge activity.
There can be only one flow path out of the Branch activity.
There can be only one flow path out of the Entitlement activity.
There can be between one and five flow paths out of the Approval activity.
The Integration activity automatically creates an action model for working with a Web service based on which document format?
CSV
TXT
XMI
XML
WSDL
In the Standard SoD Constraint Exception Approval Workflow Activity, which Activity Name determines whether the approval is a quorum condition?
Localize SoD Name
Approve SoD Conflict
Check for Processing Type
Approve SoD Conflict (Serial)
Approve SoD Conflict (Quorum)
Which statement is true regarding the Novell Identity Manager Role Mapping Administrator?
If you have both Role Manager and Resource Manager roles, you can create, edit, and delete mappings.
If you have both Role Manager and Resource Administrator roles, you can create, edit, and delete mappings.
If you have both Role Administrator and Resource Manager roles, you can create, edit, and delete mappings.
If you have both Role Administrator and Resource Administrator roles, you can create, edit, and delete mappings.
Within the Role Mapping Administrator, which displays the roles that you are authorized to manage?
Systems list
Mappings list
Authorization list
Identity Vault Roles list
Which application is used to map authorizations to Identity Vault Roles?
User Applications
Using regular expressions, which will the following expression match? (Choose 2.)
of*
of
off
often
offset
offers
Using regular expressions, which matches ‘a’ or ‘b’?
“a\b”
“a.b”
“a*b”
“a|b”
“a:b”
Using regular expressions, which phone number should the following match? .*[89]00.*[0-9]{3}.*[0-9]{4}
800-123-4567
901-123-4567
701-123-4567
808-123-4567
809-123-4567
What version of the W3C XPATH Recommendation does Identity Manager use?
1.0
1.1
1.5
2.0
2.1
3.5
Which XPATH operator is used to select all descendent nodes at any depth below the current stated node?
*
|
@
&
//
If there is a name conflict between different variable sources in an XPATH statement, what is the order of precedence?
Local (policy scope), Global, Local (driver scope)
Global, Local (driver scope), Local (policy scope)
Local (driver scope), Local (policy scope), Global
Global, Local (policy scope), Local (driver scope)
Local (policy scope), Local (driver scope), and global
Which are some best practices for using version control with Designer? (Choose 2.)
Use the Tortoise Subversion client.
Use the Subversion command line when possible.
Enable Subclipse before using version control with Designer.
Assign one person to deploy a project to a production environment.
Assign one team member to a policy rather than having multiple team members work on one policy.
The following options are found within the forms tab of the Provisioning Request Definition Editor: Form Selection Fields tab Actions tab Events tab Scripts tab Which option allows you to add, delete, and change the data type, control type, and layout order of the controls on the form?
Fields tab
Events tab
Scripts tab
Actions tab
Form Selection
Which default URL is used to access the iManager web application at 192.168.1.1?
http://192.168.1.1/
http://192.168.1.1/nps/iManager.html
https://192.168.1.1/nps/iManager.html
https://192.168.1.1:8443/iManager.html
https://192.168.1.1:8443/nps/iManager.html
Which statements are true regarding Designer? (Choose 2.)
Designer allows you to test policies off-line.
Designer allows you to perform any task on the live system.
Designer allows you to test and deploy solutions to production or test environments.
Designer does not allow existing solutions to be imported from the network into Designer.
When using Designer, what you can import at the Driver level?
Policies only
Channels and policies only
Driver sets and drivers only
A project from an Identity Vault
Driver sets, drivers, channels, and policies only
What is the naming convention for a Global Configuration Value (GCV)?
<name>.<group>.[<subgroup>.][<purpose/scope>]
<group>.[<subgroup>.][<purpose/scope>.]<name>
<group>.[<subgroup>.]<name>.[<purpose/scope>]
[<purpose/scope>.]<group>.[<subgroup>.]<name>
<name>.[<purpose/scope>.][<subgroup>.]<group>
You want to see password synchronization information when running a trace. What is the minimum trace level that will provide this information?
Level 0
Level 1
Level 2
Level 3
Level 4
Level 5
Which statements are true when using Global Configuration Values (GCVs)? (Choose 2.)
GCVs can only be set on the Driver Set.
If you set GCVs on the Driver Set object, those values cannot be inherited by a driver.
If you set GCVs on the Driver Set object, those values are inherited by a driver and replace any existing values.
If a driver has no settings of its own and inherits the GCVs from the driver set, iManager does not display them.
If you set GCVs on the Driver Set object, those values are inherited by a driver in that driver set if the driver does not have values of its own.
What eDirectory entities can Password Policies be assigned to? (Choose 3.)
Roles
Users
Groups
Partition Root Object
Login Policy Object
Which statements are true about Provisioning Request Definitions? (Choose 2.)
They are used to launch attestation workflows.
They are used to grant or revoke corporate roles.
They are used to provide policy rules.
They are used to filter requests at the driver level.
They are used to define Global Configuration Values.
Which is most commonly used to access ECMAScript?
Expression Builder
User Application Manager
Directory Abstraction Layer (DAL)
The Roles Based Provisioning Module includes a read-only Role Approval workflow. Which option does this Role Approval workflow support? (Choose 2.)
The ability to display the role using localized display names
The ability to process SoD conflicts in either serial or quorum mode
The ability to process role approvals in either serial or quorum mode
The retrieval of SoD approver DNs from the request object (nrfRequest)
E-mail notification to all approvers per SoD conflict found for SoD workflow approvals
When using the Role Mapping Administrator to create a new role, you will need to select a level for the role. Which level defines lower-level privileges?
IT Role
Mapping Role
Systems Role
Permission Role
Given the XML Document below: <nds dtdversion="3.5" ndsversion="8.x"> <source> <product version="3.5.10.20070918 ">DirXML</product> <contact>Novell, Inc.</contact> </source> <input> <add class-name="User" qualified-src-dn="O=DA\OU=USERS\CN=E123456" src-dn="\DA- TREE\DA\USERS\E123456" src-entry-id="34042" from-merge="true"> <add-attr attr-name="Facsimile Telephone Number"> <value type="structured"> <component name="faxNumber">801-555-1212</component> <component name="faxBitCount">0</component> <component name="faxParameters"/> </value> </add-attr> <add-attr attr-name="Full Name"> <value type="string">Frank Jones</value> </add-attr> <add-attr attr-name="Given Name"> <value type="string">Frank</value> </add-attr> <add-attr attr-name="Internet EMail Address"> <value type="string">Frank.Jones@da.org</value> </add-attr> <add-attr attr-name="Surname"> <value type="string">Jones</value> </add-attr> </add> </input> </nds> Within the Policy Builder Rule Conditions, what value will the XPATH Statement "@from- merge='true'" return?
null
true
false
error
success
In which order does the metadirectory engine apply policies?
1) Matching policy 2) Placement policy 3) Creation policy
1) Matching policy 2) Creation policy 3) Placement policy
1) Creation policy 2) Placement policy 3) Matching policy
1) Creation policy 2) Matching policy 3) Placement policy
1) Placement policy 2) Creation policy 3) Matching policy
1) Placement policy 2) Matching policy 3) Creation policy
Which statement is true regarding the output that DSTrace generates?
Each policy can have only one rule.
Each rule is processed multiple times per event.
Rules will only be executed if their condition logic evaluates to be true.
IDM engine trace levels 0 through 3 show policies as they are being applied.
Which connected systems support bidirectional password synchronization? (Choose 3.)
PeopleSoft
Lotus Notes
JDBC databases
SAP
Novell eDirectory
Microsoft Active Directory
Network Information Services (NIS)
Which user type works with the User Application’s Identity Self-Service, Work Dashboard, and Roles and Resource tabs and has no administrative permissions?
Designers
Business Users
Domain Manager
Which statement is true regarding regular expressions?
Must be case sensitive
Can match entire string
Cannot use wildcard characters
Cannot be changed by escape characters