Pregunta 1
Pregunta
When data changes in the Identity Vault or a connected application, which processes the
changes?
Respuesta
-
Drivers
-
Remote Loader
-
Identity Vault
-
Metadirectory Engine
-
Connected application
Pregunta 2
Pregunta
Which statement is true?
Respuesta
-
When an event occurs in the Identity Vault, Identity Manager creates an XML document that
describes the Identity Vault event and submits it through the Publisher channel to a driver shim.
-
When an event occurs in the Identity Vault, Identity Manager creates an XML document that
describes the Identity Vault event and submits it through the Subscriber channel to a driver shim.
-
When an event occurs in a connected system, Identity Manager creates an XML document that
describes the Identity Vault event and submits it through the Subscriber channel to a driver shim.
-
When an event occurs in the Identity Vault, a driver shim creates an XML document that
describes the Identity Vault event and submits it through the Subscriber channel to Identity
Manager.
-
When an event occurs in a connected system, a Driver Shim creates an XML document that
describes the Identity Vault event and submits it through the Subscriber channel to Identity
Manager.
Pregunta 3
Pregunta
Which statements are true? (Choose 2.)
Respuesta
-
When an event is being sent to a driver, it is a notification.
-
When an event is being sent to a driver, it is a command.
-
When an event is being sent to Identity Manager, it is a command.
-
When an event is being sent to Identity Manager, it is a notification.
-
Events and commands are handled the same way within an IDM 4 environment.
Pregunta 4
Pregunta
What does a Driver object contain? (Choose 2.)
Pregunta 5
Pregunta
Identity Manager uses a MetaDirectory Engine to process Identity Vault data and events. What
component assures changes in the Identity Vault are not lost if a connected system goes offline?
Respuesta
-
Partition
-
Obit flag
-
Change Log
-
Event Cache
Pregunta 6
Pregunta
An Identity Manager Job can only interact with which driver channel?
Respuesta
-
Input
-
Sender
-
Output
-
Receiver
-
Publisher
-
Placement
-
Subscriber
Pregunta 7
Pregunta
Which installation mode is supported by the integrated installer?
Respuesta
-
Silent mode
-
Non-root mode
-
Console mode
-
AutoYaST mode
-
Standalone mode
Pregunta 8
Pregunta
Which statements about the Integrated Installer are true? (Choose 2.)
Respuesta
-
It automatically handles dependencies
-
It automatically installs all of the drivers
-
The iManager plug-in needs to be manually installed
-
It exists only for the Windows operating system family
Pregunta 9
Pregunta
Which task within Novell iManager allows administrators to view all objects that are associated
with a particular Novell IDM driver?
Respuesta
-
Object Inspector
-
Driver Inspector
-
DriverSet Inspector
-
Driver Cache Inspector
Pregunta 10
Pregunta
What is the minimum RAM system requirement for Designer?
Respuesta
-
128 MB
-
256 MB
-
512 MB
-
1024 MB
-
2048 MB
Pregunta 11
Pregunta
When using Designer, which modeling mode is used to do all low-level operations with driver sets,
drivers, policies and applications?
Respuesta
-
Table Mode
-
System Mode
-
DataFlow Mode
-
Architect Mode
-
Developer Mode
Pregunta 12
Pregunta
Which view enables you to view the filters that allow the data to flow between all of the systems
and the Identity Vaults as well as view how passwords flow through the different systems?
Respuesta
-
Project view
-
Outline view
-
Dataflow view
-
Navigator view
-
Policy Set view
Pregunta 13
Pregunta
When using Designer, a perspective is a collection of related views and editors. Which perspective
should be open the first time you run the application?
Respuesta
-
Debug perspective
-
Designer perspective
-
Java/Java Browsing perspective
-
Java Type Hierarchy perspective
-
Plug-in Development perspective
Pregunta 14
Pregunta
Which view do you use to access Policy Simulator? (Choose 2.)
Respuesta
-
The Tasks view
-
The Outline view
-
The Project view
-
The Navigator view
-
The Policy Flow view
Pregunta 15
Pregunta
When you start Designer for the first time or start Designer without a project listed, which should you first do?
Respuesta
-
Make sure that the Debug perspective is selected.
-
Make sure that the Plug-in perspective is selected.
-
Make sure that the Designer perspective is selected.
-
Make sure that the Java/Java Browsing perspective is selected.
-
Make sure that the Java Type Hierarchy perspective is selected.
Pregunta 16
Pregunta
When using Designer, which view do you use to import driver sets, drivers, and channels from the
file system?
Respuesta
-
The Tasks view
-
The Project view
-
The Outline view
-
The Navigator view
-
The Policy Flow view
Pregunta 17
Pregunta
When checking in a project to a Version Control Server, you will need to specify a file path to your
Subversion server or a URL to the Subversion server. If you specify a URL, which protocols are
supported? (Choose 4.)
Respuesta
-
FTP
-
NFS
-
SVN
-
HTTP
-
SFTP
-
HTTPS
-
SVN + SSH
Pregunta 18
Pregunta
When is the package catalog created?
Respuesta
-
When a package is installed
-
When a driver object is created
-
When a Driver Set object is created
-
When a project is created or imported
Pregunta 19
Pregunta
Which statement is true regarding packages?
Respuesta
-
You can downgrade any package that has been upgraded.
-
You can delete packages from the package catalog at anytime.
-
You can only upgrade packages that have been added to drivers.
-
Before you can import packages into the package catalog, you must install them.
Pregunta 20
Pregunta
When you install Active Directory drivers, you must choose an authentication method.
Authentication identifies the driver shim to Active Directory and, potentially, to the local machine.
Which statements are true regarding the Negotiate authentication method? (Choose 2.)
Respuesta
-
This is the preferred authentication method.
-
This can be installed on a server that is not a member of the domain.
-
This uses Kerberos, NTLM, or a pluggable authentication scheme if one is installed.
-
This is used when the server hosting the driver shim is not a member of the domain.
-
When using this, some provisioning services, such as Exchange mailbox provisioning and
password synchronization, are unavailable
Pregunta 21
Pregunta
If you map the eDirectory attribute of Login Expiration Time to the Active Directory attribute of
accountExpires, when does the account in Active Directory expire?
Respuesta
-
A day later than the time set in eDirectory
-
A day earlier than the time set in eDirectory
-
An hour later than the time set in eDirectory
-
At the same time as the time set in eDirectory
-
An hour earlier than the time set in eDirectory
Pregunta 22
Pregunta
Which method can be used to start the process of installing Active Directory driver packages?
Respuesta
-
In the Modeler, right-click the driver set where you want to create the driver; then
select New > Driver to display the Driver Configuration Wizard.
-
In the Modeler, right-click the Identity Vault where you want to create the driver; then
select New > Driver to display the Driver Configuration Wizard.
-
In the Modeler, right-click the server where you want to create the driver; then
select New > Driver to display the Driver Configuration Wizard.
-
In the Modeler, right-click the application where you want to create the driver; then
select New > Driver to display the Driver Configuration Wizard.
-
In the Modeler, right-click the package catalog where you want to create the driver; then
select New > Driver to display the Driver Configuration Wizard.
Pregunta 23
Pregunta
When installing Active Directory driver packages, you can also install optional features for the Active Directory driver. Which feature should you select if you are using the Identity Reporting Module?
Pregunta 24
Pregunta
In which order should you create and start an Active Directory driver?
Respuesta
-
Import the current driver packages 2) Install the driver packages 3) Deploy the driver 4)
Configure the driver 5) Start the driver
-
1) Install the driver packages 2) Import the current driver packages 3) Deploy the driver 4)
Configure the driver 5) Start the driver
-
1) Install the driver packages 2) Import the current driver packages 3) Deploy the driver 4) Start
the driver 5) Configure the driver
-
1) Import the current driver packages 2) Install the driver packages 3) Configure the driver 4)
Deploy the driver 5) Start the driver
-
1) Import the current driver packages 2) Install the driver packages 3) Deploy the driver 4) Start
the driver 5) Configure the driver
Pregunta 25
Pregunta
When installing the Active Directory Driver, which options are available when you are selecting the
desired form for the placement of new objects? (Choose 2.)
Pregunta 26
Pregunta
In an Active Directory environment, which tools enable you to view and manage the associations
between drivers and objects? (Choose 2.)
Pregunta 27
Pregunta
Which allows you to securely store multiple passwords for a driver?
Respuesta
-
Named Passwords
-
Universal Password
-
Password Policy object
-
Event Auditing Service
-
Password Synchronization
Pregunta 28
Pregunta
To which can you add Named Passwords? (Choose 2.)
Respuesta
-
Server
-
Drivers
-
Driver Sets
-
Applications
-
Identity Vaults
Pregunta 29
Pregunta
You have noticed that a server is not listed in the Servers tab on the driver or driver set. Which
may resolve this issue?
Respuesta
-
Revert back to an older driver.
-
Revert back to an older driver set.
-
Delete the problem driver and reinstall it.
-
Delete the related driver set and then reinstall it.
-
Disassociate the driver set object and the server and then re-associate them.
Pregunta 30
Pregunta
Which statements are true regarding Global Configuration Values (GCVs)? (Choose 2.)
Respuesta
-
GCVs are variables.
-
GCVs are constant values.
-
GCVs can be changed at runtime.
-
GCVs are accessible to the tree and network.
-
GCVs are globally accessible to the driver and driver set.
Pregunta 31
Pregunta
Which correctly shows the precedence of Global Configuration Values (GCVs)?
Respuesta
-
1) GCVs from the driver set Global Configuration list 2) GCVs from the driver Global
Configuration list 3) GCVs from the driver 4) GCVs from the driver set
-
1) GCVs from the driver set Global Configuration list 2) GCVs from the driver Global
Configuration list 3) GCVs from the driver set 4) GCVs from the driver
-
1) GCVs from the driver 2) GCVs from the driver set 3) GCVs from the driver Global
Configuration list 4)GCVs from the driver set Global Configuration list
-
1) GCVs from the driver 2)GCVs from the driver Global Configuration list 3) GCVs from the
driver set 4)GCVs from the driver set Global Configuration list
Pregunta 32
Pregunta
Which drivers have Remote Loader capability? (Choose 3.)
Respuesta
-
JDBC
-
LDAP
-
eDirectory
-
Active Directory
-
Entitlement Services
Pregunta 33
Pregunta
Which pre-defined jobs operate at the driver set level? (Choose 2.)
Respuesta
-
Driver Health
-
Schedule Driver
-
Subscriber Channel Trigger
-
Random Password Generator
-
Password Expiration Notification
Pregunta 34
Pregunta
What type of Identity Manager Event does a Subscriber Trigger Event Job create?
Respuesta
-
sync
-
query
-
modify
-
status
-
trigger
-
triggerless
Pregunta 35
Pregunta
Using iManager, what do you need to select to allow you to see the Filter icons so that you can
edit filters?
Respuesta
-
The Driver
-
The Driver Set
-
The Application
-
The Identity Vault
Pregunta 36
Pregunta
Which statements about filters are true? (Choose 2.)
Respuesta
-
You cannot export a filter from a driver.
-
You can configure a filter policy for a driver set.
-
You can add a class or attribute to a filter policy.
-
There are separate filter policies for the Publisher and the Subscriber channels.
-
The same filter policy is used for both the Publisher and the Subscriber channels.
Pregunta 37
Pregunta
Which policy primarily handles the conversion of data formats from data that the Metadirectory
engine provides to data that the application shim expects?
Respuesta
-
Creation policy
-
Matching policy
-
Placement policy
-
Input Transformation policy
-
Event Transformation policy
-
Output Transformation policy
Pregunta 38
Pregunta
When an XML document has an input tag type, which are supported inputs? (Choose 4.)
Respuesta
-
<add>
-
<copy>
-
<find>
-
<delete>
-
<format>
-
<modify>
-
<rename>
Pregunta 39
Pregunta
What is wrong with this add event?
<nds>
<input>
<add class-name="" event-id="idv-jdbc-staff#Publisher#696" qualified-src-dn="O=vault\OU=employees\CN=overtestra" src-dn="\IDVVAULT\vault\employees\overtestra" src-entry-id="136443">
<association state="pending"></association>
<add-attr attr-name="CN">
<value naming="true" timestamp="1206986293#34" type="string">overtestra</value>
</add-attr>
</add>
</input>
</nds>
Respuesta
-
The Class name is missing.
-
The timestamp is incorrect
-
The association state is pending.
-
The src-dn is improperly formatted.
Pregunta 40
Pregunta
Which Policy Sets are applied only during an add event?
Respuesta
-
Matching, Create, and Placement
-
Input Transformation, Matching, and Create
-
Matching, Create, and Schema Transformation
-
Input Transformation, Schema Transformation, and Command Transformation
Pregunta 41
Pregunta
When creating an argument within a rule, which is an example of a noun token?
Respuesta
-
Map
-
Join
-
Class Name
-
Lowercase
-
Escape Source DN
Pregunta 42
Pregunta
Which types of tokens are in the Argument Builder? (Choose 2.)
Respuesta
-
Verb
-
Noun
-
Action
-
Change
-
Attribute
-
Placement
-
Replacement
Pregunta 43
Pregunta
What are benefits of using Policy Builder? (Choose 2.)
Respuesta
-
It is built on open standards.
-
It enforces password complexity.
-
It is a GUI with command line capabilities.
-
It minimizes the need for XLST stylesheets.
-
It provides a graphical interface to help data cleansing.
-
It provides a graphical interface for rapid development of policies.
Pregunta 44
Pregunta
What is a purpose of the DAL (Directory Abstraction Layer)?
Respuesta
-
To process work flows
-
To grant/revoke entitlements
-
To store entities attribute data for use in work flows
-
To provide a customized view of objects and their attributes that are stored in the Identity Vault
Pregunta 45
Pregunta
Which options might you find in a Role Membership? (Choose 2.)
Respuesta
-
End Date
-
Start Date
-
Proxy User
-
Workflow Status
-
Separation of Duties
Pregunta 46
Pregunta
Which User Application configuration object contains Provisioning Request Definitions?
Respuesta
-
AppDefs
-
ServiceDefs
-
RequestDefs
-
ResourceDefs
-
WorkFlowDefs
Pregunta 47
Pregunta
Which aspects of the User Application can be controlled by customizing the themes in the User
Application?
Respuesta
-
Modifying the HTML layouts for individual portlets.
-
Assigning different themes to different users upon login to the User Application.
-
Changing the colors and logos used by the User Application pages, headers, footers and tabs.
-
Restricting the pages and tabs that are available to a particular user upon login to the User
Application.
Pregunta 48
Pregunta
Which allows you to delete, activate, inactivate and retire existing provisioning request definitions?
Respuesta
-
User Application Driver
-
User Application Portlets
-
Workflow Administration plug-in
-
Provisioning Request Configuration plug-in
Pregunta 49
Pregunta
The User Application Security Model uses domains to create sets of configurations and
permissions that can be assigned to different user types. Under the Provisioning domain, which
permission allows the user to retract selected provisioning requests when they are in progress?
Respuesta
-
Retract PRD
-
Initiate PRD
-
Configure Delegate
-
View Running PRD
-
Configure Availability
Pregunta 50
Pregunta
The Requests & Approvals tab in the Identity Manager user application includes a group of actions
called My Settings. The My Settings actions give you the ability to view your proxy and delegate
assignments. What is the difference between a proxy and a delegate?
Respuesta
-
A delegate assignment is independent of process requests.
-
A delegate assignment applies to a particular type of request.
-
A delegate assignment can only be given to a Team Manager.
-
A Provisioning Manager can only define delegate assignments
-
A delegate assignment can only be given to a Provisioning Manager.
Pregunta 51
Pregunta
The Roles hierarchy supports three levels. Which represents the highest role level?
Respuesta
-
Kaiser Role
-
Business Role
-
Resource Role
-
Technical Role
-
Workflow Role
Pregunta 52
Pregunta
Which System Role allows members to create, remove, or modify SoD constraints?
Pregunta 53
Pregunta
Which statement is true regarding role relationships?
Respuesta
-
Roles cannot contain other roles.
-
Mid-level roles can contain lower-level and higher-level roles.
-
Bottom-level roles can be contained by higher-level roles and other bottom-level roles.
-
Top-level roles can contain lower-level roles, but they cannot be contained by other roles.
Pregunta 54
Pregunta
What role does NMAS play in synchronizing passwords in an Identity Manager solution?
Respuesta
-
NMAS controls the flow of synchronizing passwords within Identity Vault.
-
NMAS controls the flow of password synchronization in a connected system, based on NMAS
driver settings.
-
NMAS prevents legacy utilities that are not Universal Password-enabled from updating an NDS
password directly.
-
NMAS controls the flow of password synchronization, and prevents legacy utilities that are not
Universal Password-enabled from updating a password directly.
-
NMAS controls the flow of password synchronization in a connected system, and prevents
legacy utilities that are not Universal Password-enabled from updating an NDS password directly.
Pregunta 55
Pregunta
Only one policy is effective for a user at a time. Novell Modular Authentication Services (NMAS)
determines which policy is effective for a user by looking for policies in the following order and
applying the first one it finds. In which order does NMAS look for password policies?
Respuesta
-
1) Partition root container
2) Container
3) Specific user assignment
4) Login Policy Object
-
1) Specific user assignment
2) Login Policy Object
3) Partition root container
4) Container
-
1) Login Policy Object
2) Specific user assignment
3) Container
4) Partition root container
-
1) Specific user assignment
2) Container
3) Partition root container
4) Login Policy Object
-
1) Login Policy Object
2) Partition root container
3) Container
4) Specific user assignment
Pregunta 56
Pregunta
Which are advantages of using NDS password to synchronize passwords between two Identity
Vaults? (Choose 2.)
Respuesta
-
Simple configuration.
-
Universal and Distribution password updates
-
E-mail notifications for password synchronization failures
-
Enforcement of the basic password restrictions you can set for NDS Password
-
Password reset on the connected Identity Vault if the passwords don't comply with NMAS
password policy
Pregunta 57
Pregunta
Which allows you to change Universal Password in eDirectory? (Choose 2.)
Respuesta
-
iFilter
-
Designer
-
iManager
-
NWAdmin
-
IDM User Application
Pregunta 58
Pregunta
Which Identity Manager reporting component retrieves the data needed for report generation from
the Identity Information Warehouse?
Pregunta 59
Pregunta
Which report cannot be deleted and should not be run by itself?
Respuesta
-
Template
-
Identity Vault User Report
-
Identity Vault Driver Associations Report
-
Correlated Resource Assignment Events by User
Pregunta 60
Pregunta
What does the Calendar page of the Reporting Module show? (Choose 2.)
Respuesta
-
Report size
-
Report settings
-
Deleted reports
-
Finished reports
-
Reports that failed
Pregunta 61
Pregunta
Which statement is true regarding the token timeout strategy that is implemented by the Identity
Reporting Module?
Respuesta
-
The token associated with each user login times out automatically after a specific period of idle
time.
-
The token associated with each user login times out automatically after each event that affects
the user object.
-
The token associated with each user login times out automatically after a specific period of
time, after the user logs out.
-
The token associated with each user login times out automatically after a specific period of
time, regardless of what the user does.
Pregunta 62
Pregunta
Which Identity Manager component allows your organization to assure that user access to
resources does not break any corporate or government regulations?
Respuesta
-
Workflow
-
Attestation
-
Self Service
-
Data Synchronizing
-
Auditing and Reporting
Pregunta 63
Pregunta
When using Designer, what option allows you to manage and view the file resources that are in
your workspace?
Respuesta
-
Outline View
-
Project View
-
Dataflow View
-
Properties View
-
Navigation View
Pregunta 64
Pregunta
When using Designer, what option allows you to modify projects or other items that are listed in
the Navigator or Project view?
Respuesta
-
Views
-
Editors
-
Builders
-
Wizards
Pregunta 65
Pregunta
Which contains the components of Identity Manager drivers organized according to the
functionality you want to provide to a driver?
Pregunta 66
Pregunta
Which statement is true regarding creating packages?
Respuesta
-
Packages can be created using Designer or iManager.
-
Packages must be created before a Driver can function.
-
Packages can only be created for Drivers and Driver Sets.
-
Packages can only be created in environments that have IDM 3.0 or later.
-
Packages can only be created when the Identity Vault is in development mode.
Pregunta 67
Pregunta
You are trying to add content to a package. You have created content in an item. You right-click
that item and select Add to Package; however, no packages are showing in the list. What is the
cause of this problem?
Respuesta
-
You must build a package before you can add content to it.
-
You must version a package before you can add content to it.
-
You must create a package in Designer before you can add content to it.
-
You must import a package into Designer before you can add content to it.
Pregunta 68
Pregunta
Which packages can be published?
Respuesta
-
Packages that have been built
-
Packages that have been created
-
Packages that have been imported
-
Packages that have been localized
Pregunta 69
Pregunta
When installing the Active Directory Driver, which options can you choose when selecting the
desired form for the placement of new objects? (Choose 2.)
Pregunta 70
Pregunta
Which entitlement agent is ideal for simple automation?
Pregunta 71
Pregunta
Which statement about entitlements is true?
Respuesta
-
Entitlements are used as the association key for the user objects.
-
eDirectory schema is extended the first time Entitlements are invoked.
-
The DirXML-EntitlementRef attribute keeps track of the entitlements that a user has been
granted or revoked.
-
Entitlements that grant or revoke Group Membership will always take precedence over policies
that grant or revoke Group Memberships.
Pregunta 72
Pregunta
Which statement is true when creating your own Entitlements?
Respuesta
-
You create Entitlements using iMonitor.
-
You can only create Entitlements on the Publisher channel.
-
You must add the Entitlements to a driver set for them to work.
-
You must add a policy to the driver for the Entitlements to work.
Pregunta 73
Pregunta
Which domain defines rights to launch attestation requests and view the status of attestation
requests?
Respuesta
-
Role Domain
-
Resource Domain
-
Compliance Domain
-
Provisioning Domain
-
Configuration Domain
Pregunta 74
Pregunta
For which domains is it not possible to create Domain Managers? (Choose 3.)
Respuesta
-
Role
-
Resource
-
Security
-
Compliance
-
Configuration
Pregunta 75
Pregunta
Which users have access to the team configuration page? (Choose 2.)
Respuesta
-
Role Manager
-
Team Manager
-
Security Administrator
-
Resource Manager
-
Provisioning Manager
Pregunta 76
Pregunta
Which of the following can create teams? (Choose 3.)
Respuesta
-
Team Manager
-
Role Administrator
-
Security Administrator
-
Provisioning Manager
-
Resource Administrator
-
Compliance Administrator
Pregunta 77
Pregunta
In the Navigation Access Permissions page, who has access to the administration tab? (Choose
2.)
Pregunta 78
Pregunta
At runtime, which performs all of the User Application’s LDAP queries against the Identity Vault?
Respuesta
-
The publisher filter
-
The Role Catalogue
-
The Abstraction Layer Protocol
-
User Application Administration
-
The Directory Abstraction Layer
Pregunta 79
Pregunta
Which defines the Provisioning request categories the user application can display?
Pregunta 80
Pregunta
In which of the following is the directory abstraction layer editor plug-in available?
Pregunta 81
Pregunta
Which is used to define Directory Abstraction Layer definitions?
Respuesta
-
Filter Editor
-
Policy Editor
-
Integration Activity Editor
-
Directory Abstraction Layer Editor
-
Provisioning Request Definition Editor
Pregunta 82
Pregunta
Which do you use to create and deploy provisioning requests to the User Application driver?
Pregunta 83
Pregunta
Which are directory objects that encapsulate the business rules for granting or revoking a
corporate resource or role, and binding the corporate resource or role to a workflow?
Respuesta
-
Role Mapping Definitions
-
Provisioning Request Definitions
-
Data Abstraction Layer Definitions
-
Global Configuration Values Definitions
Pregunta 84
Pregunta
When adding a control to a form that is being created, Designer adds a control-named Field to the
bottom line of the form. Where is the name that is entered into this field used? (Choose 3.)
Respuesta
-
The ECMA expression builder dialog box
-
The Create Resource Wizard’s General tab
-
The Workflow tab’s Data Item Mapping dialog box
-
In the Role Mapping Administration Authorization panel
-
An internal XML reference in the provisioning request definition file
Pregunta 85
Pregunta
Which statements are true regarding workflows? (Choose 3.)
Respuesta
-
An activity represents a task.
-
A process consists of activities and flow paths.
-
A flow path ties activities in a workflow together.
-
An activity represents the work to be processed.
-
An activity can have only one incoming and one outgoing flow path.
Pregunta 86
Pregunta
Which rules need to be followed when adding activities to a workflow? (Choose 3.)
Respuesta
-
A workflow cannot contain a condition activity.
-
Each Approval activity must have a Condition activity.
-
Each Branch activity must have a corresponding Merge activity.
-
Each workflow must have at least one Entitlement or Entity activity.
-
Each workflow must have only one Start activity and only one Finish activity.
Pregunta 87
Pregunta
Which rules need to be followed when adding flow paths to a workflow? (Choose 3.)
Respuesta
-
There can be multiple flow paths out of the Start activity.
-
There can be only one flow path out of the Merge activity.
-
There can be only one flow path out of the Branch activity.
-
There can be only one flow path out of the Entitlement activity.
-
There can be between one and five flow paths out of the Approval activity.
Pregunta 88
Pregunta
The Integration activity automatically creates an action model for working with a Web service
based on which document format?
Pregunta 89
Pregunta
In the Standard SoD Constraint Exception Approval Workflow Activity, which Activity Name determines whether the approval is a quorum condition?
Respuesta
-
Localize SoD Name
-
Approve SoD Conflict
-
Check for Processing Type
-
Approve SoD Conflict (Serial)
-
Approve SoD Conflict (Quorum)
Pregunta 90
Pregunta
Which statement is true regarding the Novell Identity Manager Role Mapping Administrator?
Respuesta
-
If you have both Role Manager and Resource Manager roles, you can create, edit, and delete
mappings.
-
If you have both Role Manager and Resource Administrator roles, you can create, edit, and
delete mappings.
-
If you have both Role Administrator and Resource Manager roles, you can create, edit, and
delete mappings.
-
If you have both Role Administrator and Resource Administrator roles, you can create, edit, and
delete mappings.
Pregunta 91
Pregunta
Within the Role Mapping Administrator, which displays the roles that you are authorized to
manage?
Pregunta 92
Pregunta
Which application is used to map authorizations to Identity Vault Roles?
Pregunta 93
Pregunta
Using regular expressions, which will the following expression match? (Choose 2.)
of*
Respuesta
-
of
-
off
-
often
-
offset
-
offers
Pregunta 94
Pregunta
Using regular expressions, which matches ‘a’ or ‘b’?
Respuesta
-
“a\b”
-
“a.b”
-
“a*b”
-
“a|b”
-
“a:b”
Pregunta 95
Pregunta
Using regular expressions, which phone number should the following match?
.*[89]00.*[0-9]{3}.*[0-9]{4}
Respuesta
-
800-123-4567
-
901-123-4567
-
701-123-4567
-
808-123-4567
-
809-123-4567
Pregunta 96
Pregunta
What version of the W3C XPATH Recommendation does Identity Manager use?
Pregunta 97
Pregunta
Which XPATH operator is used to select all descendent nodes at any depth below the current
stated node?
Pregunta 98
Pregunta
If there is a name conflict between different variable sources in an XPATH statement, what is the
order of precedence?
Respuesta
-
Local (policy scope), Global, Local (driver scope)
-
Global, Local (driver scope), Local (policy scope)
-
Local (driver scope), Local (policy scope), Global
-
Global, Local (policy scope), Local (driver scope)
-
Local (policy scope), Local (driver scope), and global
Pregunta 99
Pregunta
Which are some best practices for using version control with Designer? (Choose 2.)
Respuesta
-
Use the Tortoise Subversion client.
-
Use the Subversion command line when possible.
-
Enable Subclipse before using version control with Designer.
-
Assign one person to deploy a project to a production environment.
-
Assign one team member to a policy rather than having multiple team members work on one
policy.
Pregunta 100
Pregunta
The following options are found within the forms tab of the Provisioning Request Definition Editor:
Form Selection
Fields tab
Actions tab
Events tab
Scripts tab
Which option allows you to add, delete, and change the data type, control type, and layout order of
the controls on the form?
Respuesta
-
Fields tab
-
Events tab
-
Scripts tab
-
Actions tab
-
Form Selection
Pregunta 101
Pregunta
Which default URL is used to access the iManager web application at 192.168.1.1?
Respuesta
-
http://192.168.1.1/
-
http://192.168.1.1/nps/iManager.html
-
https://192.168.1.1/nps/iManager.html
-
https://192.168.1.1:8443/iManager.html
-
https://192.168.1.1:8443/nps/iManager.html
Pregunta 102
Pregunta
Which statements are true regarding Designer? (Choose 2.)
Respuesta
-
Designer allows you to test policies off-line.
-
Designer allows you to perform any task on the live system.
-
Designer allows you to test and deploy solutions to production or test environments.
-
Designer does not allow existing solutions to be imported from the network into Designer.
Pregunta 103
Pregunta
When using Designer, what you can import at the Driver level?
Respuesta
-
Policies only
-
Channels and policies only
-
Driver sets and drivers only
-
A project from an Identity Vault
-
Driver sets, drivers, channels, and policies only
Pregunta 104
Pregunta
What is the naming convention for a Global Configuration Value (GCV)?
Respuesta
-
<name>.<group>.[<subgroup>.][<purpose/scope>]
-
<group>.[<subgroup>.][<purpose/scope>.]<name>
-
<group>.[<subgroup>.]<name>.[<purpose/scope>]
-
[<purpose/scope>.]<group>.[<subgroup>.]<name>
-
<name>.[<purpose/scope>.][<subgroup>.]<group>
Pregunta 105
Pregunta
You want to see password synchronization information when running a trace. What is the
minimum trace level that will provide this information?
Respuesta
-
Level 0
-
Level 1
-
Level 2
-
Level 3
-
Level 4
-
Level 5
Pregunta 106
Pregunta
Which statements are true when using Global Configuration Values (GCVs)? (Choose 2.)
Respuesta
-
GCVs can only be set on the Driver Set.
-
If you set GCVs on the Driver Set object, those values cannot be inherited by a driver.
-
If you set GCVs on the Driver Set object, those values are inherited by a driver and replace any
existing values.
-
If a driver has no settings of its own and inherits the GCVs from the driver set, iManager does
not display them.
-
If you set GCVs on the Driver Set object, those values are inherited by a driver in that driver set
if the driver does not have values of its own.
Pregunta 107
Pregunta
What eDirectory entities can Password Policies be assigned to? (Choose 3.)
Respuesta
-
Roles
-
Users
-
Groups
-
Partition Root Object
-
Login Policy Object
Pregunta 108
Pregunta
Which statements are true about Provisioning Request Definitions? (Choose 2.)
Respuesta
-
They are used to launch attestation workflows.
-
They are used to grant or revoke corporate roles.
-
They are used to provide policy rules.
-
They are used to filter requests at the driver level.
-
They are used to define Global Configuration Values.
Pregunta 109
Pregunta
Which is most commonly used to access ECMAScript?
Pregunta 110
Pregunta
The Roles Based Provisioning Module includes a read-only Role Approval workflow. Which option
does this Role Approval workflow support? (Choose 2.)
Respuesta
-
The ability to display the role using localized display names
-
The ability to process SoD conflicts in either serial or quorum mode
-
The ability to process role approvals in either serial or quorum mode
-
The retrieval of SoD approver DNs from the request object (nrfRequest)
-
E-mail notification to all approvers per SoD conflict found for SoD workflow approvals
Pregunta 111
Pregunta
When using the Role Mapping Administrator to create a new role, you will need to select a level for
the role. Which level defines lower-level privileges?
Respuesta
-
IT Role
-
Mapping Role
-
Systems Role
-
Business Role
-
Permission Role
Pregunta 112
Pregunta
Given the XML Document below:
<nds dtdversion="3.5" ndsversion="8.x">
<source>
<product version="3.5.10.20070918 ">DirXML</product>
<contact>Novell, Inc.</contact>
</source>
<input>
<add class-name="User" qualified-src-dn="O=DA\OU=USERS\CN=E123456" src-dn="\DA-
TREE\DA\USERS\E123456" src-entry-id="34042" from-merge="true">
<add-attr attr-name="Facsimile Telephone Number">
<value type="structured">
<component name="faxNumber">801-555-1212</component>
<component name="faxBitCount">0</component>
<component name="faxParameters"/>
</value>
</add-attr>
<add-attr attr-name="Full Name">
<value type="string">Frank Jones</value>
</add-attr>
<add-attr attr-name="Given Name">
<value type="string">Frank</value>
</add-attr>
<add-attr attr-name="Internet EMail Address">
<value type="string">Frank.Jones@da.org</value>
</add-attr>
<add-attr attr-name="Surname">
<value type="string">Jones</value>
</add-attr>
</add>
</input>
</nds>
Within the Policy Builder Rule Conditions, what value will the XPATH Statement "@from-
merge='true'" return?
Respuesta
-
null
-
true
-
false
-
error
-
success
Pregunta 113
Pregunta
In which order does the metadirectory engine apply policies?
Respuesta
-
1) Matching policy 2) Placement policy 3) Creation policy
-
1) Matching policy 2) Creation policy 3) Placement policy
-
1) Creation policy 2) Placement policy 3) Matching policy
-
1) Creation policy 2) Matching policy 3) Placement policy
-
1) Placement policy 2) Creation policy 3) Matching policy
-
1) Placement policy 2) Matching policy 3) Creation policy
Pregunta 114
Pregunta
Which statement is true regarding the output that DSTrace generates?
Respuesta
-
Each policy can have only one rule.
-
Each rule is processed multiple times per event.
-
Rules will only be executed if their condition logic evaluates to be true.
-
IDM engine trace levels 0 through 3 show policies as they are being applied.
Pregunta 115
Pregunta
Which connected systems support bidirectional password synchronization? (Choose 3.)
Pregunta 116
Pregunta
Which user type works with the User Application’s Identity Self-Service, Work Dashboard, and
Roles and Resource tabs and has no administrative permissions?
Respuesta
-
Designers
-
Team Manager
-
Business Users
-
Domain Manager
Pregunta 117
Pregunta
Which statement is true regarding regular expressions?