Which method can be used to start the process of installing Active Directory driver packages?
A. In the Modeler, right-click the application where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.
B. In the Modeler, right-click the package catalog where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.
C. In the Modeler, right-click the Identity Vault where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.
D. In the Modeler, right-click the driver set where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.
E. In the Modeler, right-click the server where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.
正解:D
質問 2:
What type of Identity Manager Event does a Subscriber Trigger Event Job create?
A. query
B. status
C. modify
D. trigger
E. triggerless
F. sync
正解:D
質問 3:
At runtime, which performs all of the User Application's LDAP queries against the Identity Vault?
A. The publisher filter
B. User Application Administration
C. The Role Catalogue
D. The Directory Abstraction Layer
E. The Abstraction Layer Protocol
正解:D
質問 4:
Which statements are true when using Global Configuration Values (GCVs)? (Choose 2.)
A. If you set GCVs on the Driver Set object, those values cannot be inherited by a driver.
B. GCVs can only be set on the Driver Set.
C. If you set GCVs on the Driver Set object, those values are inherited by a driver and replace any existing values.
D. If a driver has no settings of its own and inherits the GCVs from the driver set, iManager does not display them.
E. If you set GCVs on the Driver Set object, those values are inherited by a driver in that driver set if the driver does not have values of its own.
正解:D,E
質問 5:
Which are advantages of using NDS password to synchronize passwords between two Identity Vaults? (Choose 2.)
A. Simple configuration.
B. Enforcement of the basic password restrictions you can set for NDS Password
C. Password reset on the connected Identity Vault if the passwords don't comply with NMAS password policy
D. Universal and Distribution password updates
E. E-mail notifications for password synchronization failures
正解:A,B
質問 6:
To which can you add Named Passwords? (Choose 2.)
A. Applications
B. Driver Sets
C. Identity Vaults
D. Drivers
E. Server
正解:B,D
質問 7:
Only one policy is effective for a user at a time. Novell Modular Authentication Services (NMAS) determines which policy is effective for a user by looking for policies in the following order and applying the first one it finds. In which order does NMAS look for password policies?
A. 1) Login Policy Object 2) Specific user assignment 3) Container 4) Partition root container
B. 1) Specific user assignment 2) Container 3) Partition root container 4) Login Policy Object
C. 1) Login Policy Object 2) Partition root container 3) Container 4) Specific user assignment
D. 1) Partition root container 2) Container 3) Specific user assignment 4) Login Policy Object
E. 1) Specific user assignment 2) Login Policy Object 3) Partition root container 4) Container
正解:B
加藤** -
より深く理解できるようにイラスト図解しているところだ好きです。私を050-730合格させることに成功しました。